Throughout the years there have been many technologies involved with notebooks, and laptop batteries are no different. There are actually three distinct notebook battery types on the market today. Knowing the difference between them will help you decide on exactly what to get when the time comes for a purchase.
In this article I will discuss the three different laptop battery types, as well as some of the advantages each one carries.
Nickel Cadmium – NiCd batteries were actually the first rechargeable laptop batteries ever. Manufactures loved them because their cost was relatively low and they had a high output. You won’t find Nickel Cadmium batteries being used anymore, due to them being heavier and not as efficient as the newer laptop batteries.
Nickel Metal Hydride – NiMH batteries can still be found all over the place -- particularly for older model laptops. The rechargeable NiMH laptop battery was a big step up for notebook technology mostly in part because they were more reliable than the NiCd batteries, and they had an even higher output. The NiMH battery was also cheaper to produce, and safer to use.
The only issue with NiMH batteries is that they can have a memory effect. Basically, if you don’t fully discharge the battery, it can remember this and leave you with a less than perfect battery output.
Lithium Ion – LiON batteries are now used in most new laptops. Unlike the NiMH battery, LiON laptop batteries have no memory effect. LiON batteries are also lighter than both NiCd and NiMH notebook batteries. Both of these advantages equal out to the Lithium Ion battery being the most popular and most expensive among the various notebook power sources.
You are probably wondering which type of battery to get. Getting a Lithium Ion battery would be the best solution, and if you have the money that is what I recommend. If you cannot afford a LiON battery or your notebook is not compatible with one, then getting a NiMH battery is the next best thing.
|W|P|114501871118633995|W|P|Types Of Laptop Batteries|W|P|venkat@sgdnetworks.comWith all the wheeling and dealing that seems to take place on the internet at all times of the day, it can sometimes get confusing just trying to find your own deal. Finding the best price on your new laptop is most likely your highest priority at this point, but there are other important factors as well.
In this article I will discuss some of the best ways to ensure that you get the ultimate price on your new beauty, as well as a few other tidbits that shouldn’t be left out.
I don’t know about you, but I always love to first check out prices on eBay. In fact, this is what I recommend that you do also. Head on over to eBay and see what kinds of prices are listed for your specific notebook. I am assuming you are looking for a brand new laptop, so that is what you should look for on eBay. I like to look at the “buy it now” prices, of course making sure that the price listed is for a brand new machine. Alternatively you can look at auctions that are about to end. This method will usually give you a little better indication of what your specific notebook is going for on eBay.
eBay is good to look at first, mainly because they usually have the best prices. By finding out what you can get your laptop for on eBay, you will instantly have a lowball figure that others must beat.
So what now? I recommend going over to a couple price comparison sites such as shopping.com or pricegrabber.com. What these sites do is list a bunch of merchants that are selling the specific product that you are looking for. What is great about it is that a price is listed by each merchant, as well as customer reviews of the store (merchant).
A lot of these price comparison sites will even list the shipping price, and then calculate your total cost for whatever you want… It’s a win-win situation for you!
So now you are going to want to search for your specific notebook on a few price comparison sites. When the merchant listings come up, look for prices that are better than the ones you got from eBay. You will probably want to skip merchants with a bad rating, or at the most, go in and see why they are rated poorly. One more thing –- Look at the shipping price… Sometimes you can get free shipping, or shipping at a much better rate than the auctions listed on eBay, which could steer the deal away from them.
Hopefully you have found an even better deal at one of the price comparison sites online. If you want, you can even go to some of the big name computer retailers and look at their prices, (even though many of them are listed on the price comparison sites). Sometimes you can find clearances though that will beat any of the prices you have found.
One other last point –- Reliability is very important, especially with a purchase like this. For the eBay auctions you are going to want to look at the seller’s feedback rating, and on the price comparison sites you are going to want to look at the merchant’s customer ratings.
If you take the time to properly use the various resources that are available on the internet, you will find that getting a great deal on a new laptop is a lot easier than one might think.
|W|P|114501865371655535|W|P|Getting A New Laptop At A Great Price|W|P|venkat@sgdnetworks.comIf you are like most student's, money isn’t exactly growing on trees. Choosing the right laptop can be a matter of saving yourself a lot of heartache and money at the same time.
In this article I am going to over the most common uses that a student has for a notebook as well as talk about the most important components you should have for these uses.
Most student's will list the obvious things that a laptop is needed for; stuff like word processing, e-mail etc. The reality is that today’s student's are using computers more than ever for a lot more. The average student's list may look something like this:
- Word Processing - E-mail - Internet - Music Downloads - Possible Video Editing - And More…
Every one of the above can now be part of the student’s functions when using a notebook. You may or may not need some of the above, so I will also go over that below.
Let’s go over the 5 most important notebook components for today’s student.
CPU – In short, the CPU basically evaluates and executes commands given to it. So a faster CPU will be able to execute commands quicker, right? Yes, but having the latest Intel or AMD chip is definitely not needed. Depending on your memory and operating system you can get by just fine on a 1.0GHZ processor, or even less. Most of the newer systems come with more than 2.0GHZ, and you may want this if you are doing any video editing or something that requires faster processor speeds.
Memory – The amount of memory that your prospective notebook features has a big impact on how fast applications will load, and generally how fast your computer will run. For this reason, memory is one of the most popular computer upgrades available. Newer machines will come with at least 256mb of RAM (memory), but if you are going to be using Windows XP I highly recommend getting more. You can get by running 256mb of memory while using Windows XP, but it will slow.
I remember when I replaced my 256mb stick of RAM for 512 megabytes –- It felt like a totally new computer. If you are on a very strict budget stick with 256mb. If you need more, either find a laptop that already carries 512+ megabytes of RAM or get a RAM upgrade. Getting a memory upgrade actually isn’t that expensive.
Hard Drive – If you are the type of student that loves having a lot of music files or videos, you are going to want a bigger hard drive. Getting at least a 60 gigabyte hard drive would be the perfect solution in this case. If you aren’t going to be downloading music all the time or putting big files on your notebook, than 40 gigabytes or lower will work fine. Most new laptops come with at least a 40 gigabyte hard drive.
CD-RW – This is probably one of the most used parts on a student’s notebook, hands down. If you download music and want to transfer it to a CD, you are going to need a CD burner. If you want to burn DVD’s you are going to have to go one step further and get a DVD-RW drive. If you don’t need any of these functions, having a normal CD or DVD reader drive will work great.
Internet – Pretty much every student needs to connect to the internet. With such a wealth of knowledge available online, virtually every student is connected now a days. Pretty much every laptop you find will be able to connect to the internet in some way, but you most likely want something that will work on your campus. For this, you want your potential notebook to have a wireless internet card.
Ok, those 5 parts can’t be everything to look out for, right? You are right; there are a few more things that can actually be quite important to some students.
Weight – If you are constantly carrying your laptop around campus you don’t want something that will break your shoulder. If weight is important to you, look for something in the 6-7 pounds range.
Display – If you don’t need something ultra big, look for a screen size of around 15 inches. Most people agree that 12-14 inch screens do not provide comfortable viewing. Bigger than 15 inch screens are nice, but also add more weight to the laptop.
One last important note before you head out and get your baby… Plug in to an outlet as much as possible. Laptops do not run on batteries forever, and you are wise to save your batteries power for when you really need it.
Taking the time to really go over what you need a notebook for and then finding something that will meet those needs will save you where it matters most –- The pocketbook.
|W|P|114501860714893651|W|P|How To Buy The Perfect Student Laptop|W|P|venkat@sgdnetworks.comLaptops are lovely. They are convenient, mobile, powerful and prestigious. They are also thief magnets. Over 400,000 laptops disappear each year, leaving their owners wondering where they went, what is happening with their data and what to do next. Some of the laptops are just lost – left in cabs, at hotels, restaurants and at conferences and events. Many of these laptops (but not all) find their way back to their lucky owners. Some are stolen by people – many of them co-workers, service staff or people taking advantage of a “moment of opportunity” – who just want to have a laptop. Some are stolen by professional “Laptop Lifters” who may work in teams to steal the laptops for resale. And others are stolen, not for the laptop itself, which may be a bonus, but for the data on the laptop’s hard drive – financial or identity data or business plans or data. For example:
1) Securing the actual laptop There are many ways to control the physical security of a laptop.
There are cable locks that can be attached to an immovable object to make it more difficult to just pick up the laptop and walk away. Although these cables can be cut with a bolt cutter, some of them are combined with an alarm that will sound if the cable is cut.
Alarms or motion detectors are also available without the cable locks. They can be set to activate whenever the laptop is moved or when the laptop is moved a certain distance away from a pocket receiver that the owner has, which also alerts the owner. www.anchorpad.com, www.kensington.com, www.computersecurity.com, www.pcguardian.com, www.trackitcorp.com, www.minatronics.com
Use a laptop carrying bag that does not look like a laptop case. Having a laptop case that says IBM or Sony is advertising that you are carrying a highly valuable commodity. Consider using a backpack with your laptop in it in a padded sleeve. One of the prime places for laptop theft is the men’s bathroom in airports and convention centers. Another prime place that laptops are stolen is at pay phones in a busy area.
Just as there are pickpocket teams, one of whom distracts you by “accidentally” bumping into you while the other steals your wallet, there are “Laptop Lifters” one of whom will accidentally spill something on you while the other walks off with your laptop. A good rule to follow is: any time there is a diversion near you, put your hand on your laptop.
People usually feel comfortable at conferences and conventions. After all, you are usually surrounded by your peers, and there are often convention staff around to provide security. Often the theft will take place on the second or third day, when IDs for entry are not being checked as stringently, and many of the attendees are NOT wearing their badges. Many times people will leave laptops unguarded on or under conference tables during breaks.
Even if it is not your laptop that is stolen, your PCMIA cards – modem or wireless connectors – can be stolen in an instant. Not only is this a loss of value, it’s also a real inconvenience.
It’s a good idea to engrave your company information prominently on the outside of the laptop and on its carrying case. It makes it less attractive to the thief, because it makes it easy to identify and makes it harder to sell. Having a large or conspicuously colored luggage tag securely affixed makes it less attractive because thieves like to be “invisible.”
You also should be sure to send in that little registration card that came with your laptop. Sometimes a stolen laptop will be sent back to the manufacturer for repair by the person who had innocently bought it from the thief. You may get your laptop back this way.
Don’t leave your laptop in your car. If it is visible, you may lose your laptop AND have to pay for the damage to your car. Rental cars are often the special target of thieves, especially at popular restaurants or shopping malls. Plus, the extremes of temperature (both hot AND cold), can either fry your laptop or freeze the LCD screen.
2) Data Security
Losing your laptop may mean you’ll have to shell out $1,000 - $3,000 for a new one. Losing your data can be MUCH more serious. Many people ONLY have a laptop, so ALL of their data is on it. Plus, most people don’t back up their data as often as they should.
Replacing the data can be a pain. But losing your PERSONAL data, including perhaps your Social Security number, PIN numbers, credit card info, etc can be a form of personal hell.
Here are the steps you should take:
Set a BIOS password. BIOS is the first program to load when you turn on your computer. Your laptop will not boot at all until that password is entered. Although there are ways to bypass this, (there’s all kinds of info on the ‘Net), it’s the first in several layers of security you can institute. (See http://www.lockdown.co.uk/?pg=biospsw&s=articles to see how to set a BIOS password).
Use the NTFS file system (assuming you are using XP). NTFS has strong encryption capabilities not available in FAT or FAT32. Here are a couple of articles that might help you decide: http://windows.about.com/od/filesfoldersdisks/l/aa001231b.htm http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/convertfat.mspx
Prevent data loss through your Infrared port. Do you actually use your infrared port? Do you even know if you have one? If you do have one, your computer can be hacked into all the way across the room! A simple way to disable it is to put a piece of black electrical tape across it. (It’s a little dark window, generally on the back of your laptop). Alternatively you can disable the infrared port completely. Because each laptop manufacturer has different steps, search on Google or Yahoo for “Disable Infrared Port” and add your laptop manufacturer’s name to the search terms.
Back up your data before you leave your office. That way, if your laptop is lost or stolen, you have not lost your files.
Consider keeping sensitive files off your laptop hard drive. A DVD can hold multiple gigabytes of data and can be carried in your pocket. A USB storage device is also quite handy.
If you are running XP Pro, your can encrypt your data using EFS (Encrypting File System), so it will be totally unreadable without the decryption key. If you don’t have the Pro version, you can purchase third party encryption software.|
3) Getting your laptop back.
So the worst has happened and your laptop has disappeared. Hopefully, you have your name and phone number on it somewhere, so it can be returned to you if it was just left in a cab.
If you’ve taken the right steps before it disappeared, there’s a fair chance you will get it back.
Here’s what you can do to increase the chance of getting it back:
There are software solutions that allow you to trace your laptop if it ever connects to the Internet. For instance, www.computrace.com/ will give you the IP address wherever your laptop logs on. The cost is under $50. Getting the police to go and recover your laptop is another story, however.
|W|P|114501842350519621|W|P|Laptop Security -Where'd My Laptop Go?|W|P|venkat@sgdnetworks.comWhen Irwin Jacobs, chief executive and founder of Qualcomm Inc. had his laptop stolen from a journalism conference in September 2000, it shed light on a growing problem.
Other recent events have focused national attention on the laptop security issue, consider the following:
• In July 2001 the Federal Bureau of Investigation reported that 184 laptops had been stolen or lost. At least one and possibly as many as four contained classified information.
• In April 2001 the British Defense Ministry reported 205 laptops missing since 1997, most of which contained classified materials.
• In February 2000 a laptop computer with “highly classified” information disappeared from the U.S. State Department. Then, in May 2000 two more laptops were reported missing from the U.S. State Department.
While technology has made laptops smaller, easier to store and transport, it has also made them easier to conceal and steal. It’s the convenience that has made the laptop computer so popular and the information vehicle of choice for business people throughout the world.
.The computer itself is a valuable asset and one that should be protected, but it can be replaced, however, the information stored on it in many cases is not replaceable and of greater value to competitors if compromised. A thief can get a few thousand dollars for a top of the line laptop, but he can get a whole lot more for a company’s marketing plans.
High Risk Locations
A high percentage of laptops are stolen from the office. FBI officials estimate as much as 75 percent of laptop thefts are committed by insiders, individuals who are expected to be on the premises. For example, employees, delivery people and janitors all have access to the grounds and buildings and have opportunities to steal unprotected laptops.
In one case, Canadian authorities apprehended a man believed to have stolen 20 to 30 laptops from an office building over a span of a few weeks. The suspect would enter the building dressed as a maintenance employee, load computers onto a dolly and exit the building. He performed this routine so often, that building employees believed he was actually a member of the maintenance staff.
According to a USA Today article, heightened airport security as a result of the September 11 terrorist attack has caused an increase in the number of lost laptops at airport checkpoints. . The problems stem from new procedures that require passengers to remove their laptops from their cases and put them through x-ray machines. They either forget to pick them up or grab a stranger’s laptop by accident. It becomes more problematic for travelers who are singled out for magnetic wand searches and may be separated from their valuables on the conveyor belt for extended periods of time.
Business travelers should also pay close attention to their laptops when at the following locations:
*Hotels
*Train Stations
*Bus terminals
*Car rental agencies
*Conference Centers
*Restaurants
*Restrooms
*Payphones
Always remember, laptop theft can happen anyplace, at any time.
Laptop Theft Prevention Tips
Employees
• Disguise your laptop. By carrying your laptop in a case designed for computers, you alert the thieves you have a laptop. Carry your laptop in an ordinary piece of luggage, satchel or other inconspicuous bag.
• Record the laptop serial number, make and model information. Keep this information in your purse or wallet so if your computer is stolen, the information will be readily available when you file a police report.
• Never leave your laptop unattended in a public place.
• Use computer-locking cables to secure the computer to a desk or table
• Never place a computer in checked luggage.
• If a laptop must be left in the car, store it in the trunk of the vehicle prior to arriving at the final destination.
• Identify your carrying case in some unusual way to make it stand out from all other bags. An unusual color, colored tape or yarn or exceptionally large or brightly colored tags attached to the bag will help you immediately locate the bag and give police probable cause to stop and question the carrier.
• Also consider taping colored paper or placing a large tag on the front of you laptop to avoid accidental mix-ups at the x-ray machine.
• Regularly back up information and store it separately in case your computer is stolen.
Employers
• All laptops should be permanently marked or engraved with inventory or serial numbers so they can aid in recovery if found by the police. Check with the manufacturer regarding appropriate marking locations and warranty criteria prior to marking.
• Conduct scheduled inventories of laptops periodically.
• Proper documentation should be maintained for all laptops. Records could include the type of equipment identifiers such as make, model and inventory or serial numbers, an equipment assignment date, and the employee responsible for the laptop.
• Some companies utilize electronic asset tracking technology. Employers can tag laptops with a small electronic transponder. If an employee attempts to leave the building with the computer, the system records the time, date and exit used. Some systems can also give security the ID of the employee taking the equipment.
• Access to the area where laptops are stored when not assigned should be limited to a select few individuals.
• The limited access storage area should be situated away from high traffic areas.
• Access should be controlled to areas such as offices where employees utilize laptops. This can also be accomplished through the use of ID card systems.
• Some companies have established policies making employees responsible for the loss of a laptop if they do not follow company policy for safeguarding it. Communicate the policy in writing and get a signed statement of acknowledgement.
• Employers have also been known to require employees to purchase their laptops, reasoning that employees will better care for them.
• Provide employees with loss prevention and security awareness training. E-mails, brown bag luncheons, new hire orientations security awareness literature/posters and video presentations are all excellent vehicles for getting the word out.
• Provide employees with adequate secure storage areas for their laptops such as locked security closets, cabinets and lockdown devices at desks and workstations.
|W|P|114501818600736738|W|P|Now You See It, Now You Don't: Preventing Laptop Computer Theft|W|P|venkat@sgdnetworks.comThe following is a list of tips to help safeguard your laptop while traveling or conducting business.
1. Never leave your laptop unattended. Keep your laptop in your physical possession at all times and pay particular attention at the following locations: airports, hotels, car rental agencies, offices, restaurants, college campuses, restrooms, payphones, libraries, bars, hospitals, conferences centers, train stations and bus terminals.
2. Record your laptop’s serial number, make and model information in your purse or wallet so if your computer is stolen, the information will be readily available when you file a police report.
3. Disguise your carrying case. By carrying your laptop in a case designed specifically for computers, you alert thieves to the fact that you are carrying something valuable. Instead, consider carrying your laptop in an ordinary piece of luggage, satchel, briefcase or other inconspicuous bag.
4. Lock it up! Use computer- locking cables to secure your laptop to a desk or table.
5. Etch, engrave or permanently mark your computer with your name and phone number. You might also consider placing several of your business cards inside carrying case pockets.
6. Never place a computer in checked luggage.
7. Identify your carrying case in some unusual way. Brightly colored tape, yarn or tags will help you to locate your bag in the event it comes up missing. When traveling, you might also consider affixing something brightly colored to your actual laptop ( in light of new security measures at airports, travelers are required to remove their laptops from their cases at security checkpoints).
8. If your laptop must be left in your car, store it in the trunk of the vehicle prior to arriving at the final destination.
9. Regularly back up information. Make sure you store this information separately in case your computer is stolen.
10. Report it stolen as soon as possible. In the event that your laptop is lost or stolen, make sure you report it missing to your employer and local authorities as soon as possible. This will help to speed up the recovery process.
|W|P|114501807473460795|W|P|Ten Tips to Safeguard Your Laptops|W|P|venkat@sgdnetworks.comIt's a fact. Notebook computers have leapt into the global sales arena with the force and flexibility of Bruce Lee, effortlessly dispatching their desktop competitors with nothing more than a dynamic one-inch sonoma punch.
With wi-fi technology blossoming around us, the demand for laptops is only set to increase. The ability to play games, or casually surf the internet in wireless coffee shops and airports, will ensure that notebook computers remain incredibly popular.
Laptops, though, aren't just utilized for leisure. Mobile technology is also beginning to dictate what happens in the classroom. This is especially true as notebooks are entering the educational arena in ever-increasing numbers. Indeed, schools such as Framingham State College, and the Myron B. Thompson Academy have both decided to use laptops as teaching tools in class.
Thanks to the adaptability and portability of laptop computers, retailers enjoyed a bountiful sales year in 2004. Consequently, everyone's using notebooks these days, from sprightly seventh graders to zimmer-wielding septegenarians.
But can this popularity and the incredible global sales figures be sustained?
Yes they can. Once you couldn't find a notebook for under a thousand dollars, but now there are entry level selling for seven hundred dollars, and even lower with coupons and rebates. Recently, Wal-Mart began to offer laptops with a linux operating systems, and 30GB hard drives for under 500 dollars.
So just how low can laptop prices go?
Can you say a hundred dollars?
If Nicholas Negroponte, founder of MIT's Media Lab gets his wish, wireless laptops for third world countries will soon be available for around 100 dollars.
2005 - The Year of the Rooster?
Think again. This is most definitely the Year of the Laptop.
|W|P|114501790882389689|W|P|Enter the Laptop|W|P|venkat@sgdnetworks.comIt's easy to be intimidated by all the laptop models on the market today. There are literally dozens and dozens in every price range.
The key to finding the right one for you is to step back and consider exactly how you plan to use your laptop. When you define what you need before you go shopping, buying the right machine becomes much easier.
Here are 5 basic factors to consider:
1. SIZE
In the world of mobile computing, size definitely matters. The size of a laptop affects two key areas: portability and display size.
If you're always on the go and will be using your computer only in short bursts, a so-called ultralight will save you some shoulder strain.
On the other hand, if you're going to spend hours in front of your laptop, a larger display may be in order.
Today, some laptop displays exceed 17 inches, rivaling the display size of many desktop systems. The down side is that these monsters can easily weigh three times as much as an ultralight.
2. HARD DRIVE
Speaking of size, what about the size of the hard drive? One way to approach this issue is to ask yourself the following question:
Will this be my primary computer, or will it supplement my desktop system?
If the former, you should look for a bigger hard drive - 60 GB or more.
If the latter, you may be able to make it with a 20-30 GB hard drive.
But even this isn't absolute.
If, for example, you plan to copy a huge MP3 library from your desktop system to your laptop to make your music library portable, you'd be well advised to err on the side of too big.
3. MEMORY
In determining the right amount of system memory, or RAM, take a look at the ways in which you intend to use your laptop:
If your needs are somewhat mundane - email, spreadsheets, word processing, etc. - 256 MB of RAM should be plenty. This is a common configuration for many laptops, so it means you probably won't need to spend extra for more RAM.
On the flip side, if you're an aspiring mobile digital photographer or videographer, you should stuff your laptop with as much RAM as it can hold.
In fact, exactly how much RAM your laptop can hold may in part drive your purchase decision. Applications for editing and manipulating multimedia content are notorious resource hogs.
4. NETWORK CONNECTIONS
Thanks in no small part to the Internet, computing in the 21st century relies heavily on being connected:
Connected to the Internet, connected to a corporate network, connected to a wireless network, connected to a home network, connected to an online service.
Your life will be easier if you buy a laptop that includes built-in means to connect to them all.
5. PRICE
If you're considering a laptop, you're probably wondering how much money you'll need to spend.
A few years ago, you'd be hard-pressed to find one for under $2,000. Today, there are plenty of laptops to be had for under $1,000.
What's more, most of the major manufacturers offer a variety of financing options.
Laptop prices have come down, to be sure. However, a laptop still represents a fairly major purchase for most people.
If you take the time to search for a laptop that meets your specific needs, you should get many years of use and enjoyment from this important investment.
--
You may republish this article, but must keep the resource box and copyright at the end.
|W|P|114501727394469474|W|P|5 Tips For Buying The Right Laptop Computer|W|P|venkat@sgdnetworks.comIf you're a bargain shopper looking to get the most bang for your buck, you'll find no shortage of deals on the Internet.
And that's particularly true in the fast-changing world of laptop computers, where you'll find three bargain sources right at your fingertips:
1. Clearance Sales
Just like many brick-and-mortar retail stores, many computer manufacturer websites have clearance sections. On these web pages, you can find great deals on last year's leftovers.
These are all new products (unless otherwise stated) and carry their original warranties. The only difference is that the price has been reduced.
Of course the manufacturers aren't the only ones with clearance merchandise.
Major electronics and office supply retailers also include clearance sections on their websites, where you may be able to find the laptop bargain of your dreams.
2. Refurbished Laptops
Factory refurbs represent another great bargain opportunity. It works something like this:
Buying a refurb can literally save you hundreds.
3. Online Auctions
You can always logon to an auction website and find a great deal on a used laptop. However, beware!
Buying anything used carries with it some risk. Buying a used laptop carries more risk than most people should be willing to take.
When you buy a used laptop from a private party, you don't get any sort of warranty beyond DOA.
DOA stands for "dead on arrival", a common auction term that means the seller guarantees the item will work when it arrives at your house.
But what happens if your laptop dies two weeks after it arrives? You're out of luck, that's what.
There are enough bargains available on warrantied laptops that all but the most meager budgets should be able to avoid buying used.
Stick to clearance and refurb machines and you'll save yourself hundreds on your next laptop computer.
|W|P|114501720733716345|W|P|How To Save Big Bucks On A Laptop Computer|W|P|venkat@sgdnetworks.comYou've laid out good money for your laptop computer, but you're not done spending just yet.
There are a few more laptop accessories you may want to consider to make the package complete.
1: Laptop Case / Bag
As the newest member of the mobile computing force, you're required to take an oath of safe computing.
And that starts with investing in the most important of laptop accessories - a laptop bag. You can't very well go traipsing around the world with your laptop exposed to the elements.
When it comes to laptop bags, you can spend $25 for a small case made from less expensive materials on up to several hundred dollars for one made of top-grain cowhide.
However, in the end, the most important consideration is whether your case can hold your laptop, plus all the other goodies that go with it (like the ones described here).
2: Software
Did your laptop come with software? If so, did it come with the right software - the software you actually need to perform whatever tasks you need to perform?
Don't just assume you have everything you need. You'll probably need to add some software, as well as go online to update the software that was included.
3: A Real USB Mouse
Trackpads and eraser nubs that fill an obvious need. However, given the option, most people would rather user a real mouse.
If you stop and think for a moment, you're likely to realize that many places where you'll be computing actually are suitable for a real mouse.
So one of the most useful laptop accessories you can buy is a USB mouse, keep it in your bag, and use it whenever you're able.
4: A Cat5 Ethernet Cable
Your built-in Ethernet port won't do you much good if you get to your hotel room, discover an Ethernet connection, and don't have a cable. Some hotels provide them; others don't. Always come prepared with the right cable.
5: A Standard Telephone Cable
The same holds true for your modem connection. If you don't have a cable to get you from your computer to the phone jack, you're not going anywhere in cyberspace.
6: Disposable Cleansing Cloths
Over time, the display on your laptop is going to get dusty, or even smudgy. You're playing Russian roulette with your laptop if you attempt to clean your display with paper towels and spray cleaners.
Instead, use disposable cleansing cloths. These essential laptop accessories are designed specifically to clean laptop displays. Always have a stash on hand.
7: USB Drive
A USB drive is a storage device about the size of your thumb that plugs directly into a USB port.
Capacity-wise, they're relatively small - usually well under 100 MB. However, they're very useful for moving files quickly and easily from one computer to another, e.g., moving a PowerPoint presentation from your laptop to your business associate's laptop.
A USB drive also makes a great temporary backup medium for the really important files you create on the road.
8: Blank CD-R Discs
You've just finished your big sales presentation. Someone from the audience approaches you afterward and asks for a copy of the presentation.
You'll make a better impression if you:
a) ask the person for their email address and tell them you'll email the presentation later
b) ask for their physical address and tell them you'll mail a CD later
c) burn them a CD of the presentation on the spot.
In case you didn't figure it out, the answer is c. Always be prepared with these inexpensive laptop accessories.
9: Stereo Headset
It's great to be able to watch DVD movies no matter where you are. Imagine watching your favorite flick at 30,000 feet.
There's just one problem.
The family in the row behind you has absolutely no interest in hearing the dialog from Pulp Fiction.
Do yourself and everyone around you a favor. When you're watching movies or listening to music in public, use your headphones.
10: Security Device
Laptop security devices come in many shapes and sizes.
For example, most laptops include a security dock that allows you to attach your laptop to some immovable object via cable, much like you'd lock up your bicycle outside the grocery store.
|W|P|114501714203894021|W|P|The Top 10 'Must-Have' Laptop Accessories|W|P|venkat@sgdnetworks.comLooking for a real bargain on laptop batteries? How do I know the batteries are running good as advertised? Which merchants are offering quality rechargeable cells? Where can I get the bargain? Where to buy?
Many of you have some of these questions? Certainly!!. We surely want to saving our hard to earn $$ and only buy quality cells.
Here are the simple 7 ways to to locate the real bargain.
1. Shop online Why?
Most of suppliers/distributors are now targetting retail consumers themselves. The online store overheads are much less than retail stores. No store leasing, No utitlity bills and much less employee payrolls. With all these, they can pass the big savings to customers. Importantly, they have the same guarantee and warranty as retail stores..plus...it's convenient!!! Quailty merchants offer FREE shipping!!
2. Find the saving coupons
This is the beauty!!...."saving coupons"....Online marketting is highly competitive. They are million of stores out there. Merchants want to get noticed, they want sales...they issue saving coupons for marketting.......buying your laptop batteries using "online saving coupon" is double savings.
how to find?...here we go....
go to your favorite search engines "laptop battery coupon" as an example. you will find many coupons from many merchants.....now what...which one to buy?? ....let move to the next step.
3. Find the quality merchants (ONLY)
Now we found many merchants selling online and offering saving coupons. Let buy...?? Nope...not yet.....please make no mistake - buy from the cheapest possible stores is NOT a real bargain. We also want quality. laptop batteries need to meet or exceed the original battery specification. Merchants need to own the following qualities...
You can normally locate the Bizrate reviews at the merchants' homepages. Simply click on the links they provide to review previous customers' comments.
Simply follow these 3 easy steps, you will find the real bargain comparing to local retail stores. Have a pleasant online shopping experience!!
|W|P|114500849329976531|W|P|3 Easy Step To Locate A Real Bargain On Laptop Batteries|W|P|venkat@sgdnetworks.comA laptop computer certainly provides you with an unprecedented level of freedom and mobility away from the office. However there are a few extras you might want to bring along on your laptop travels:
Extra 1: portable printer
If you travel a lot, you never know when you might need to commit one of your digital documents to paper.
Sure, you can probably find a Kinko's, or even the business center at your hotel, but the experienced business traveler knows you're much better off when you're not at someone else's mercy.
Extra 2: USB hub
If you need to connect to several external devices simultaneously, the one or two USB ports on your laptop may or may not be sufficient. If not, keep an inexpensive four- port USB hub in your laptop case.
Extra 3: PC card token ring adapter
Ethernet is the industry standard for computer networking, however back in the 1970s IBM introduced a competing technology called Token Ring.
While Token Ring has all but faded from the mainstream, some hardcore IBM'ers still use it.
If you're going to be working in such an environment, you'll need a PC Card to connect to the network.
Extra 4: Foreign power kit
If you travel abroad, you're bound to run into a wide variety of power schemes - power schemes that aren't compatible with your laptop.
When you're away from the homeland, you'll need some sort of adapter/converter if you want to plug into a local wall outlet.
These are relatively inexpensive and can be easily found online.
|W|P|114500843644189052|W|P|Laptop Computer Extras for the Mobile Traveler|W|P|venkat@sgdnetworks.comHeading off on vacation soon?
Then perhaps you're tempted to take your trusty laptop along for the trip.
After all, you bought it for its mobility, and it's nice to stay in touch via email with your family and friends back home.
However, just before you start packing, its pays to consider the downside of traveling with a laptop, particularly if you're planning to go abroad:
1. Weight
A laptop (plus accessories) starts to feel heavy very quickly. And who really needs MORE luggage to carry around?
2. Security risk
To you, it's a laptop computer. To a thief, it's a bag of easy money. (About $1000). And that bag is something you have to guard every second of your vacation.
3. Power supply problems
You'll need a different power adaptor plug for each country you visit. And depending on your laptop power supply cable, you may also need a step-up / step-down voltage transformer.
4. Connection complications
You'll need to find a way of connecting to the Internet. If your laptop is suitably equipped and you can find a local hotspot, you can take advantage of wireless Internet access.
Otherwise you're stuck with dial-up modem access, which means a choice between:
- using your existing ISP's local call number in the country you're visiting (provided your ISP has a local number! AOL and Compuserve generally do.)
- making a long-distance telephone call to your regular dial-up number back home
- signing up with a local ISP (rarely practical in the short-term)
5. Telephone socket trouble
Different countries have different types of telephone socket. If you're planning on connecting via dial-up access, you'll have to bring a suitable telephone adaptor plug.
You'll also need a digital signal tester to test for higher- voltage digital telephones lines. Otherwise you could end up frying your modem and possibly the motherboard too.
6. Extra insurance cover
It's highly unlikely your travel insurance policy extends to laptop computers. You'll therefore need to arrange separate specialist insurance cover, which isn't cheap.
7. You're on holiday!
Do you really want your office with you on vacation? Aren't you supposed to be getting away from it all?
If you're beginning to think that traveling with a laptop computer is a major logistical exercise, then you're right. (Just ask any "road warrior"!)
However, there IS an alternative:
An Internet Cafe.
Almost every city and large town now has several Internet cafes. To locate one when you're abroad, just ask your hotel receptionist or a friendly taxi driver.
You'll also find Internet cafes in airports, railway stations, major hotels, business centers, public libraries, and even onboard cruise ships.
Before you leave on your travels, simply ensure you can access your email via a web browser. (This is known as "webmail". Most ISPs offer this option automatically - just ask them if you're unsure.)
Alternatively, set up a free webmail address (at hotmail.com or yahoo.com) for the duration of your trip and give it to anyone who might need to contact you.
With webmail set up, all you have to worry about is remembering your email login and password. Everything else - hardware, connectivity, security - is somebody else's problem.
To summarize:
Unless you have a very good reason for taking your laptop on holiday, you'd be wise to leave the darn thing at home and use an Internet cafe instead.
And who knows - maybe your laptop could use a vacation from you!
|W|P|114500838801983539|W|P|7 Reasons NOT to Take Your Laptop on Holiday!|W|P|venkat@sgdnetworks.comAs the proud owner of a laptop computer, you'll want to keep your machine in the best possible condition.
Aside from cleaning your screen and dusting the keyboard, however, you'll need to take a few extra steps to maintain your laptop's health:
-- Play it cool
A laptop computer generates a lot of heat, especially when running the latest high-powered software. Too much heat and you risk damaging the internal circuitry.
Always try to keep your laptop in a well-ventilated, cool environment. And ensure you don't block the fan grills on the sides, back, or bottom of the machine at any time.
-- Handle the screen carefully
Avoid touching or playing with your LCD screen.
Yes, it might be fun to watch the waves generated by your finger against the screen, but LCD displays are fragile devices that must be cared for.
Take care when cleaning the screen too, and use only approved cleaning materials.
You won't want to pay the money for screen repairs or, even worse - a new machine entirely.
-- Don't drop it
Whatever you do, don't drop your laptop computer! Keep it safe inside of a carrying case when moving around or traveling.
Don't leave it on the edge of a table or on an unstable support of some kind. One ill fated drop to the floor could spell death for your mobile office.
Try to make sure the rubber feet underneath are in good condition and are still attached. This will prevent the device from sliding around accidentally.
-- Be careful with those drinks...
If you need to have a drink while working or playing, be careful not to spill it.
Your laptop computer could suffer the consequences from just a few drops of liquid poured in the right places.
While you probably do eat and drink around it regardless, you will want to occasionally wipe down the edges, the keyboard, the touchpad, and maybe even wipe down the screen to keep any dirt from accumulating.
-- Just say no to viruses
Security wise, make sure you obtain an anti-virus program.
Secondly, keep it updated!
Buying an anti-virus one month and not updating it for the next six really negates it purpose. Your laptop computer could be exposed to hundreds and thousands of new viruses every month if you don't update your virus definitions.
Most anti-virus programs have automatic update methods, eliminating the need for you to have to remember to do it manually.
-- Avoid Popups
Pop-ups are particularly annoying on a laptop computer. Trying to close a bunch of windows without a regular mouse can be a nuisance.
You'll want a pop-up blocker, such as the Google Toolbar (located at http://tools.google.com), to prevent these pop- up ads.
Many intrusive forms of advertising, and even some viruses, can install software on your machine by using various forms of pop-ups. It's best to get yourself a blocker and avoid the situation entirely.
-- Use a firewall
Always utilize a firewall on your Internet or network- enabled laptop computer. Even if you use Windows XP's built- in firewall (or purchase one from such companies as Norton), your security will greatly benefit from it.
Blocking out all the unnecessary ports and closing all the loopholes will prevent a hacker or virus from freely entering your hard drive.
So there you go. Combine all of the above tactics and help your laptop enjoy a happier and healthier lifestyle!
|W|P|114500833560039596|W|P|How To Take Care Of Your Laptop Computer|W|P|venkat@sgdnetworks.comSmall Can Be Beautiful
When purchasing a new computer, you may be better served by a laptop than a traditional desktop computer. Recently, laptops with capabilities similar to desktops can be purchased for a comparable price. Laptops are convenient because of their small size and ability to run from a battery. Except for the power cable to recharge it, a laptop doesn’t have any external wires, so it won’t be contributing to a cable mess.
When looking at laptops, consider how often you will travel with it. If you plan to travel only infrequently, get a model with a larger screen and lower price. If you are a digital nomad, you should be concerned mainly with the laptop size, weight, and battery life. For maximum portability, get a laptop that weighs less than 3.5 pounds, has a 12” or smaller display, and a minumum 4-hour battery life.
Unlike desktops, laptop computers can be difficult and expensive to upgrade. When you purchase a laptop, consider that any internal features such as CD-ROM or hard drive may be difficult to replace. Laptops can be upgraded externally with USB, FireWire, and the PC Card slot. Because each of these methods is external, however your laptop will become less portable if you need to carry around the external devices.
Take One Tablet...
A Tablet PC is a custom laptop that allows you to write on the screen to save notes and work with programs. Tablet PCs are typically smaller than laptops and feature a specialized processor that is extremely battery-efficient. Some Tablet PCs do not have a built-in keyboard, but can connect to an external keyboard. These are ideal for people who use the Tablet PC mode most of the time and need to use the keyboard occasionally.
If you have little need for a portable computer, a "desktop replacement" may be for you. A desktop replacement looks like a laptop, but is much larger and priced competitively with desktops. Whatever kind of laptop fits your lifestyle, gone are the days when laptops were expensive and less capable than traditional desktop computers.
|W|P|114500823353790304|W|P|Selecting a Laptop|W|P|venkat@sgdnetworks.comHundreds of thousands of laptop computers are stolen every year, yet only a tiny percentage of those laptops are ever recovered! Most notebooks are swiped when they are left unattended in offices, hotel conference rooms, taxi cabs, and public places such as airports and restaurants.
When your laptop is sold on the street, valuable data is lost with it. Sometimes the data, not the computer, is the real target. A devious thief with access to personal details stored on your laptop's hard drive such as, name, address, date of birth, bank details, and social security number, could wreak havoc with your personal finances and credit rating.
There have been many high profile victims of laptop theft. Recently a laptop computer was stolen from California Governor Arnold Schwarzenegger's press secretary, Margita Thompson. Access to confidential political data may have been the prominent motive behind the theft of this notebook.
Protecting your laptop computer
Recently IBM has created a fingerprint reader for select Thinkpad T42 models, that could well be the future of laptop security. The fingerprint reader creates a biometric layer of security almost impossible to breach, but what about the rest of us with older notebooks?
Below you'll find 4 useful ways to protect your laptop computer.
Laptop cable locks
Cable locks should deter the casual pilferer. Many laptops are equipped with a Universal Security Slot (USS) that allows the notebook to be attached to a cable lock. They can be purchased cheaply at office supply outlets and computer stores.
Engraving your laptop computer
Permanently engraving your precious notebook may seem like a drastic measure, but marking the outer case of the laptop with your phone number and address, may deter thieves and, if stolen, increase the chance of having the laptop returned to you.
Laptop motion detectors
Equipping your notebook with a motion detector alarm that sets of a loud noise if it is moved. Such an alarm might cause a thief to discard the laptop. An interesting variation is a small radio transmitter that triggers an alarm when a notebook moves more than 10-20 feet away from a receiver kept in your purse, wallet or pocket. Such an alarm would certainly alert the thousands of people a year who simply leave their laptops in taxis.
Laptop tracking
Stolen laptops can be electronically traced using a software tracking code installed inside the laptop's hard drive. Tracing programs, such as Cyberangel work when the laptop connects to the Internet and secretly reports the location of the laptop. Computrace Personal offers a similar service through a three year contract and agrees to pay up to $1000 if your notebook computer is not recovered in thirty days. Ztrace is a company offering an interesting twist to laptop tracking. They offer a facility to remotely delete or encrypt sensitive files on your laptop after it is stolen.
The portability of laptop computers is both a boon to busy executives and to laptop thieves. Learning to secure your notebook will thwart their efforts and keep your laptop and precious data safe!
|W|P|114500814180040655|W|P|Laptop Computer Security - How Safe Is Your Notebook?|W|P|venkat@sgdnetworks.comHave you noticed that laptop computers are beginning to dictate what happens in the classroom? Additionally, mobile technology is changing where learning takes place. This is especially true as laptops are entering the educational arena in ever increasing numbers.
Yet not all educators are quick to jump on the notebook bandwagon. They are waiting to see if laptop use is truly changing learning for the better. That’s why schools such as Framingham State College in Boston and the Myron B. Thompson Academy in Honolulu are being scrutinized. Both schools have elected to use laptop computers as a major resource in their curriculum.
It must be noted that simply having laptop computer access does not change the learning process - the entire curriculum must change and merge technology with academics. Using a laptop is more than replacing paper and pencil with electronics. The entire relationship between the teacher and students must change. Teachers are no longer merely dispensers of knowledge but become facilitators in a learning process that takes place with additional tools for communication with students. This encourages greater student involvement, long recognized as a key to learning.
Professors actively engaged in education via technology see laptops as a way to give real life experiences to otherwise insipid theories. For instance, physics students can witness the breakdown of radioactive materials, math students can apply their knowledge of logic to projects that use spreadsheets, and english majors can evaluate peers’ poetry and prose. With laptop availability in the classroom, access to additional information and knowledge is readily available.
So what do students think of the laptop trend? Well most find it invigorating. Rather than dealing with one dimensional lectures, teachers can engage the internet to show relevancy to daily life. Out of date, static texts can be set aside for breaking news stories - and so much more.
As schools show the link between laptops and learning effectiveness, the trend for laptop use will certainly grow. For those opposed to the technological revolution taking place in today's classrooms, perhaps the words of Maria Montessori should be heeded.
".....If education is always to be conceived along the same antiquated lines of a mere transmission of knowledge, there is little to be hoped from it in the bettering of man's future....."
|W|P|114500804079372668|W|P|Laptop Computers Instigate Classroom Revolution!|W|P|venkat@sgdnetworks.comOne of the worst feelings I have ever had was the day my laptop was stolen. The laptop can be replaced. However the loss of critical DATA was the biggest risk my business has ever faced.
When I recovered from the experience I asked myself the question….”what can I learn from this disaster?” The lesson is simple, loss of data is the largest threat facing any business.
There is nothing that can prepare you for the feeling of loss and the dread that comes with knowing that your personal data is gone forever. While it is very inconvenient and can be very expensive to replace the laptop itself, NOTHING can replace the hours of hard work that is represented by the data stored on a modern computers hard disk drive.
Whether you own a laptop for personal use, or have one for business reasons, there are many, many, items that are sitting there on your hard drive that are simply priceless. We don’t often think about the little bits of ones and zeros etched into a spinning magnetic plate as being critical elements in our lives, but no matter what you use a computer for, you most likely have literally megabytes (at least) or even gigabytes of data that you can not afford to lose.
For personal computer users there are mp3 play lists, emails, personal photo albums, and other important files that we all save on our hard disks. For the professional computer user, the stakes are higher…perhaps it’s the accounting data for your company’s 3rd quarter earnings, the PowerPoint presentation you will be giving to the CEO on Thursday afternoon, or the proposal that needs to be sent to the European office A.S.A.P. These “intangible” bits of data play a critical role in our professional and personal lives, whether we like it or not.
Even the most experienced of computer users can take for granted their personal data stockpiles. This is where data backup storage comes into play. No matter how careful you are with your hardware there is always the potential for disaster to strike and rob you of your critical information, and the best way to ensure the integrity of your data and the hard work it represents is a well thought out online secure data backup solution.
By securing your data using an online secure data backup provider you are ensuring that your data is safe not only from circumstances beyond your control, such as laptop theft or natural disasters, but also safe from user error and prying eyes. An online secure data backup solution keeps your data safe and sound in a secure, offline location and is as simple to set up as the applications you are used to installing on your machines.
If the safety of your critical files is important to you, you should consider using an online secure data backup for your important mission critical files. Don’t let a disaster strike before you start thinking about remote data backup…
Your DATA is your LIFE. Protect it!
|W|P|114500799562866842|W|P|The Day My Laptop was Stolen Almost Killed My Business|W|P|venkat@sgdnetworks.comRoll over lumbering desktop computers, the limber laptop is here, and it's here to stay! For a while now notebooks have outstripped their ageing desktop PC siblings, easily winning the gold medal in the computer sales olympics. We will illustrate how the PVP effect has contributed greatly to the increase in popularity of notebook computers.
(P) Portability:
Firstly it may be stating the obvious, but people buy laptops because they can take them anywhere. Office workers need no more be confined to their claustrophophic cubicles. Instead those statistic charts and data reports can be compiled on a train, in the comfort of an arm chair, or even on the beach! Portability equals flexibility, but alas this hasn't always been the case. Todays ultra portable laptop computers have a come along way since the bulky, sewing machine sized machines of the late seventies and early eighties. Indeed one of the first portable computers was built by IBM, and this machine (IBM 5100) weighed in at a hefty 50lbs! Today's corridor warriors would have trouble lugging that puppy from meeting to meeting, unless of course they subjected themselves to an intensive dose of steroids :)
(V) Value:
In the seventies the aforementioned IBM 5100 would have set you back a staggering 20,000 dollars. Today a top of the range IBM Thinkpad can be bought for around 3000 dollars. Cheaper Thinkpads can often be obtained for well under a thousand dollars, especially if you don't mind purchasing a used or refurbished model.
(P) Performance:
Many laptops today come fitted with Centrino processors which offer superb performance and improved battery life. What is Centrino I hear you ask? Well this is Intel's name for their new notebook technology that combines their Pentium M processor, 855 chipset and the Intel PRO/Wireless 2100 WiFi 802.11 network interface. Laptops fitted with these processors are usually lighter because of the smaller components used.
Couple this attractive feature with wireless networking technology and you have a powerful technological package. Wi-Fi is short for "Wireless Fidelity" and it's usage is growing quickly amongst home users, office workers, even coffee shops. If you enter Wi-Fi areas with a properly equipped notebook, you can access the Internet at broadband speeds.
|W|P|114500790485495251|W|P|Laptop Computers and the PVP Effect!|W|P|venkat@sgdnetworks.comLeave prepared when traveling with your notebook computer. Internet connectivity at your destination is one thing to think about when taking your portable office with you on your next trip. You might want to consider some of the following options:
Make sure you have a dial-up access account. Dial-up offers the advantage of portability. You can connect using any telephone jack. DSL and cable connection providers provide dial-up access for use when away from home. Check with your Internet Service Provider.
Find out which hotels offer internet connectivity. Most deluxe and extended stay hotel chains offer high-speed internet connections or have a special telephone with a jack for a line to connect with your computer's modem for dial-up. Some hotels even have a business center with fax and printer access.
Make a list of dial-up access numbers for your travel destinations. Check your ISP for access numbers at cities and towns served. It is best to make a spreadsheet to save on your laptop to use when you get there and for future reference. If your ISP serves only your local area, you might want to get a new ISP if you plan to travel frequently.
Know how to set up an internet connection using the internet connection wizard. To change your access number for the duration of an extended stay, go to your browser menu bar and select Tools, then Internet Options - Connections - Settings - Properties. Change the area code and the number. Know if you need to dial the area code and the number and include the area code in the Telephone Number field. Find out if you need to prefix a 9 to the number in the hotel you will be staying to access an outside line.
Wireless connectivity. A cell phone which can be connected to your computer or a slot card which is in itself a wireless dial-in device are useful where it is uncertain whether there exist land lines or you need internet access while on the road.
Bundle neatly all your cords and cables and pack your carrying case for easy inspection of your portable office by airport security personnel at the checkpoint.
Keep track of battery usage. Consider a spare battery, especially on long flights.
A portable, external USB Zip drive is avaliable for notebooks if you use Zip disks for backup and transfer. These are compact and need no separate power source.
Kinko's Copies offers services to notebook users such as printing from your laptop, dial-up and high speed internet connections and are located in most larger cities.
If your cumputer at the office runs 24-7 and has an "always on" internet connection you might want to subscribe to GoToMyPC service so that you can access your home office computer with your laptop when you are out of town.
Never pack your computer with your checked baggage.
|W|P|114500783357360885|W|P|Have Laptop Will Travel|W|P|venkat@sgdnetworks.comIntroduction
One day you may be asked to write a parser that will have to parse a bunch of documents and break them down into a structured model and store them in a relational-database. And those documents will most likely be written in MS Word. And the sad part would be that they would not have any structure, they will not follow any standard and they will include OLE/embedded objects. I was assigned with such a task, and it was a very interesting experience for me.
Since this was my first such project, meaning automating MS Office application, I had to go and do a lot of reading about automation. The good news is that there is a bunch of stuff out there; the bad news is that all of them are written for VB or VBA developers. I couldn’t find anything for C++ developers. Long story short, I am writing this article to make things a little easier for someone else that might be assigned with a similar task.
The original code I worked on was written using Borland C++ Builder 5 Professional. This article is however, the C# version. By the way if you are interested in seeing the C++ version ask for it and I will post it. I encourage people to take a look at the C++ version sometime to start appreciate the simplicity of C#.
Background
No special background is necessary. Just have some hands on experience with C#.
Using the code
I am going to include some code that will allow you to understand how to get what you need from a Word document. It really doesn’t matter if you are making a console application or a Windows application. The steps and the code is the same. So you can go ahead and create new C# project. You may choose to create a Windows Application that way you can click some button.
Okay so once you create a new project, go ahead and right click on References in the Solution Explorer, and select Add Reference… When the Add Reference window comes up select the COM tab. This will list all Component Names which are available on your machine, since we are going to use MS Word, we will scroll down until we find: Microsoft Word 9.0 Object Library.
Note: Yours might be a different version depending on the version of Office installed on your machine. This is for MS Word 2000.
using System; using System.Drawing; using System.Collections; using System.ComponentModel; using System.Windows.Forms; using System.Data;
namespace sparser {
/// Summary description for Form1.
public class frmParserMainUI : System.Windows.Forms.Form
{
/// User Interface Objects
/// I have removed the user interface object, since
/// they have nothing to do with
/// the actual code, and they take a lot of space.
...
/// Required designer variable.
private System.ComponentModel.Container components = null;
private System.Windows.Forms.OpenFileDialog openFileDialog;
...
The following block create MS Word COM Object. This is the object which will be used to access WORD application functions. To see what functions are available you can do it either within Visual Studio .NET IDE or MS Word.
/// MS Word COM Object
/// This is where we create our WORD object
private Word.ApplicationClass vk_word_app = new Word.ApplicationClass();
...
To view the functions from MS Word, launch Word, hold down the Alt key and press F11 [Alt+F11], this will give you the VBA window, once there press F1 to get the help window, and do a search for document object. This is the best source of documentation for available functions. However, the documents have been written for VBA, but at least you know what the function does and what kind of parameters it takes.
Alright the code continued...
...
/// The main entry point for the application.
[STAThread]
static void Main()
{
Application.Run(new frmParserMainUI());
}
/// Get source document. Open a FileDialog window for
/// user to select single/multiple files for
/// parsing.
private void butSourceDocument_Click(object sender, System.EventArgs e)
{
if( openFileDialog.ShowDialog() == DialogResult.OK )
{
object fileName = openFileDialog.FileName;
object saveFile = fileName + "_Vk.doc";
object vk_read_only = false;
object vk_visible = true;
object vk_false = false;
object vk_true = true;
object vk_dynamic = 2;
object vk_missing = System.Reflection.Missing.Value;
// Let make the word application visible
vk_word_app.Visible = true;
vk_word_app.Activate();
// Let's open the document
Word.Document vk_my_doc = vk_word_app.Documents.Open(
ref fileName, ref vk_missing, ref vk_read_only,
ref vk_missing, ref vk_missing,
ref vk_missing, ref vk_missing, ref vk_missing, ref vk_missing,
ref vk_missing, ref vk_missing, ref vk_visible );
... Alright, so here the user is given a file open dialog where they can select a Word document. Notice that we save the filename as an object. This is because the functions that we use need reference to object.
So now we can use our Word object to start Word. This is achieved by the vk_word_app.Visible = true; and vk_word_app.Activate(); The first statement makes sure that the instance of Word is visible, and the second one activate it. If you don't want the Word instance to be visible just set the Visible property to false.
Next we create a Word Document object, and that is done using Word.Document vk_my_doc = vk_word_app.Documents.Open( ... ); Notice all the parameters which are required by the function. Most of them are NULL values, so we use vk_missing which is a System.Reflection.Missing.Value.
So now we have created a Word instance and opened a Word document. Now let's move on with the code...
...
// Let's create a new document
Word.Document vk_new_doc = vk_word_app.Documents.Add(
ref vk_missing, ref vk_missing, ref vk_missing, ref vk_visible );
// Select and Copy from the original document
vk_my_doc.Select();
vk_word_app.Selection.Copy();
// Paste into new document as unformatted text
vk_new_doc.Select();
vk_word_app.Selection.PasteSpecial( ref vk_missing, ref vk_false,
ref vk_missing, ref vk_false, ref vk_dynamic,
ref vk_missing, ref vk_missing );
// close the original document
vk_my_doc.Close( ref vk_false, ref vk_missing, ref vk_missing );
...
Next we would like to create a new document. This is just like clicking the New Blank Document button on the toolbar. So we create another Word Document object, and this time notice that we use vk_word_app.Documents.Add( ... ); This will add a new blank document which is also visible.
Next what we do is select all content from the document which we opened, and we copy it.
Next we paste our content into the new document with a special format. The format used in the code is for plain text. This is because we want to get rid of the crap Word puts into the formatting of the text. Then we close our original document without making any changes.
...
vk_new_doc.Select();
FindAndReplace( "^t^t^t^t^t^t^t", "^t", vk_num );
// Save the new document
vk_new_doc.SaveAs( ref saveFile, ref vk_missing,
ref vk_missing, ref vk_missing, ref vk_missing,
ref vk_missing, ref vk_missing, ref vk_missing,
ref vk_missing, ref vk_missing, ref vk_missing );
// close the new document
vk_new_doc.Close( ref vk_false, ref vk_missing, ref vk_missing );
// close word application
vk_word_app.Quit( ref vk_false, ref vk_missing, ref vk_missing );
}
}
... Now let's say if we are interested in doing a find and replace operation, we would basically select the whole document and use the Find and Replace function.
Note: The FindAndReplace function does not belong to Word object or Document object, it is user defined, the actual Find and Replace function is define in the following block.
Next we want to save our changes to the new document and close it.
And finally quit word.
...
private void FindAndReplace( object vk_find, object vk_replace,
object vk_num )
{
object vk_read_only = false;
object vk_visible = true;
object vk_false = false;
object vk_true = true;
object vk_dynamic = 2;
vk_word_app.Selection.Find.Execute( ref vk_find,
ref vk_false, ref vk_false,
ref vk_false, ref vk_false, ref vk_false, ref vk_true,
ref vk_num, ref vk_false,
ref vk_replace, ref vk_dynamic, ref vk_false,
ref vk_false, ref vk_false, ref vk_false );
}
} }
The above block shows the actual FindAndReplace function. Notice that it belongs to the vk_word_app object. And the function operates on the active selection. The Find and Replace function is a part of the Find function with special parameters. These parameters can be identified in the documentation as I mentioned at the top of the article.
The code demonstrated above, illustrates how to open a word document, how to create a new word document, selecting, copying, pasting, and doing a Find and Replace function.
As you can see, once you get an understanding of how Word operates and go through the documentation you will be able to automate all the functions that Word has to provide.
// Let's get the content from the document
Word.Paragraphs vk_my_doc_p = vk_new_doc.Paragraphs;
// Count number of paragraphs in the file
long p_count = vk_my_doc_p.Count;
// step through the paragraphs
for( int i=1; i<=p_count; i++ )
{
Word.Paragraph vk_p = vk_my_doc_p.Item( i );
Word.Range vk_r = vk_p.Range;
string text = vk_r.Text;
MessageBox.Show( text );
}
If you take a look at the code above, you can see that we have declared an object that represents a paragraph in a Word document. This is how you can extract text from a Word document, you get the paragraph object and you can access all the paragraphs that are contained in the list. The code loops thru every paragraph of a given document and displays them in a MessageBox.
Points of Interest The new version of Office, Office 2003 is going to make things a little easier for Office developers. So if you are an Office developer, you should start looking into the features that Office 2003 has to offer. One of the nice features that I like is the capability of exporting documents into XML format.
|W|P|114484136095127505|W|P|Automating MS Word Using Visual Studio Net|W|P|venkat@sgdnetworks.comOnce an artificial intelligent program is set up in a computer or robot with a computer brain, it must then be given a memory or data sets, which it will use thru decision matrixes to arrive at decisions. If robotic assistants are to become all that Isaac Asimov predicted in his Sci Fi works and mimic our favorite robots in the movies such as; C3PO, R2D2 and Hal we will need to work to insure that the data we include is mixed with human personality phrases, words of wisdom and clichés. How can we do this?
Well, simple really, one of the best ways is to enter into the computer database random jokes, catch phrases and comments. Perhaps tone of cynicism at times might also be a nice touch. You see if a computer is to mix with humans and interact as assistants, company and companionship as team members during space flight, exploration missions and other activities the human must bond with them. Human bonding and personal social interaction includes joking, teasing and embellishment of stories.
If you will observe next time you are at a BBQ, coffee shop or even at a parts counter at a company you will see such human interaction taking place and we must insure that such programming and data sets are within the computer to make it simulate this. If not all this fancy AI will not achieve its objectives, as humans will learn to dislike these assistants and reject them. It’s time to consider this in 2006.
|W|P|114484127617332772|W|P|Data Fusion in Artificial Intelligent Machines|W|P|venkat@sgdnetworks.comSpyware - this is one of the biggest threats to security and privacy in the internet today. Spyware intrude, break and enter our computers and pose a great threat especially with more malicious spywares. Leaving a home or business computer unprotected from spyware is just like leaving the front door open to intruders. The internet was not designed with security checks in place, that is why spywares have spread unchecked and now pose a big threat to the security and privacy of millions of internet users all over the world. Roughly 90% of computers today are infected or are vulnerable to spyware. It is more important more than ever to make sure spyware protection is in place in the form of spyware removers.
To combat spyware, it is important to understand what a spyware is. The term spyware covers a wide variety of malicious software that is designed to intercept or take partial control of the operation of a computer without the informed consent of the owner or user. The term spyware implies software that stealthily keeps an eye on the user; however, it has come to refer to software that undermines a computer's operation without the owner or user knowing it. Spyware, adware and other malware will exploit the vulnerability of a computer usually for commercial purposes.
Spyware programs embed themselves into the computer and monitor the user's internet browsing activities, spy on confidential information such as credit card info, send annoying pop-up advertisements and slow down your computer's performance. Other consequences of spyware infestation include hijacked browsers resulting to reset home pages, changed search results, spam emails, toolbars added to the browser without consent and many more. In such cases, a spyware remover is necessary to clean up the system from all spyware programs and hidden malware.
A spyware remover is a necessary and worthwhile investment to keep any computer system free from spyware programs that could wreak havoc in it. Every computer must be well equipped to combat spyware and its effects. As the threat of spyware worsens, there is a variety of techniques available to counteract it. Spyware removers and other anti-spyware programs are available that help stem the threat of spywares. These spyware removers are designed to remove or block spyware. There are a number of spyware removers available, some are free while others require payment.
Some of the most popular spyware removers include Lavasoft's Ad-Aware SE and Spybot - Search and Destroy. These spyware removers are effective tools for removing and intercepting spyware programs. Microsoft has also offered its own spyware remover dubbed Windows AntiSpyware Beta, which is currently released as a free download for users of Windows XP, Windows 2000 and 2003. Anti-virus firms have also introduced spyware remover functions in their respective products.
There are two ways in which a spyware remover can combat spyware. Real time protection prevents spyware from being installed. Scanning and removal inspects the contents of the computer's files and removes files and entries, which match a list of known spywares. Most spyware removers today combine the two approaches. Spyware remover, just like anti-virus software require regular updates of its database of threats as new spyware programs are released all the time. The best spyware program protects the computer from any intrusive spyware and prevents it from being installed as well as keeps the system free from any trace of spyware programs.
|W|P|114484117832724474|W|P|Spyware Remover - Protect Your Computer from Spyware|W|P|venkat@sgdnetworks.comAccounting software is becoming more and more popular as companies are growing and expanding their business. Accounting software is a program that small and large companies use to keep records of all of their accounting transactions. This would include things such as payroll where companies keep track of all employee wages and taxes on these wages.
The section of this type of software that is called expenses allows the company an easy way to track all their operating costs, all the way down to the smallest expense. Financial records are used to record all of a company's transactions. Accounts payable and receivable are used to help a company keep track of all the money that is collected and all the money that is paid out. You also have billing, collections and timesheets on most all accounting software, plus other features that are not mentioned here.
Many companies develop their own accounting software to suit their company's individual needs. However, you can also purchase this software from someone else that will design the software according to your specifications. You can also purchase a package that has all ready been set up and add modifications to it as you see fit. Most of the accounting software programs that you can purchase are owned by one of the two leading companies, which are Microsoft and Sage.
Finding the correct accounting software for your business is very important. You do not want to purchase more features than needed but you do need to make sure it has enough to accommodate your company's needs. You should find out if the software you are purchasing can be upgraded as your company grows, this is especially important for small companies that expect to expand in the future. You also have to make sure that the designer of the accounting software can help fix any bugs or other problems that you may encounter when using their software. Make sure that you are using secure software, it is vital that the information used in programs such as these are kept secure. Accounting software is a great asset for any company.
|W|P|114484110254142531|W|P|Accounting Software Basics|W|P|venkat@sgdnetworks.comThe term software is generally used for computer software that is an essential part of the computer system. It stores and process all encoded information or computer instructions on PC. Computer software has very vast scope in computer world.
According to computer science and software engineering computer software is all information that is processed by computer systems, programs and other data. Software is completely opposite to hardware, which is used to store or execute the software. Software is loaded into random access memory and then executed in central processing unit. It belongs to machine language that is not easy to understand for the users.
Every operating system has its own software that requires an individual processor. It understands machine language that consists of several groups of binary values, which gives processor instructions and data. Software converts machine language in simple language that enables the users to understand machine language.
Software generates a connection between electronic hardware and data. The user can operate the sequence of data instructions with the help of software. Software can use any type of data such as output/input. Sometimes the output of software can be input for another software. Software provides an interface between hardware, data and other software.
Software can be divided in three classes such as system software, application software and programming software. System software enables the users to run computer hardware and computer system including operating system, device drivers, diagnostic tools, servers, windowing systems and some more.
Users can perform one or more tasks simultaneously with the help of application software. With the help of application software, they can perform all applications like office suites, business software, databases and games. Whereas the programming software offers some functional tools that enables the programmer to write difficult computer programs. Programming software provides some useful tools like text editor, compiler, interpreter, linker and debugger etc.
After installing software a computer can operate that vary software. Application software passes the instructions to system software and then computer program executes on computer.
|W|P|114484098552740353|W|P|Software Guide: Some Tips About Software|W|P|venkat@sgdnetworks.comA content management system is a computer software system for organizing and facilitating collaborative creation of documents and other content. The term content management system is usually used in its abbreviated form cms.
The cms is frequently a web application used for managing websites and web content, though in many cases, content management systems require special client software for editing and constructing articles. The content management systems were initially developed internally at content publishing organizations.
CNET spun out its internal development offerings into a separate company called Vignette in 1995. The company started offering the software as a web based content management system, allowing sites to create templates of the presentation of their content on the web.
A consulting company, Pencom Web Works in 1998, introduced the Metaphoria Data Transformation Server, allowing java developers to write applications that would be tied with content and target the content output to different channels. The product failed but the concepts that were introduced by it made their way into most ancient content management systems.
Many companies in the early 2000s began offering weblog software, which brought many of the concepts surrounding content management systems to the masses. Six Apart, with the release of their Movable Type quickly established itself as a leader in this field.
Types of content management systems:
• web content management system or web site content management system is a type of content management system software used for managing websites. The software assists in automating various aspects of web publishing and manages content for distribution on a web server.
• learning content management system or lcms assists in managing the web-based learning content life cycle.
• document imaging systems or dis are also generally considered under the family of general content management.
• enterprise content management or ecm is the software technology that enables organizations to create/capture, manage/secure, store/retain/destroy, publish/distribute, search, personalize, and present/view/print digital content such as pictures/images, text, reports, video, audio, transactional data, catalog, code. The ecm systems primarily focus on the capture, storage, retrieval, and dissemination of digital files for enterprise use and their life-cycle management. The ecm concept is not restricted to web based technologies but includes client/server and host based solutions.
• Transactional content management system assists in managing e-commerce transactions.
• Integrated content management system assists in managing enterprise documents and content.
• Publication management system assists in managing the publications (manuals, books, help, guidelines, references) content life cycle.
|W|P|114484091796887647|W|P|Content Management System|W|P|venkat@sgdnetworks.comWith the power of Flash the internet has come alive with animation and interactivity. Websites that were once flat and boring now have depth and interactivity that is quickly approaching the level of full-fledged computer software. As the capability of flash has increased so has the demand for people to create flash movies. Flash training is always an uphill battle but there are many sources of information that one can turn to. Tutors, classes, books, and online tutorials are just a few of the ways to get good Flash training.
Tutors are a great way to get Flash training. They can offer you personalized Flash training so that you can learn exactly what you want or need to learn. This is especially good if you specialize in animation because they can teach you to make killer animations without getting bogged down with the programming end. However, tutors are often hard to find and they are very expensive. If you have a friend or neighbor who is willing to teach you what they know, take advantage of the opportunity.
Formal classes provide the most structured environment for Flash training. Each course is broken into lessons and the material is often sequential. People who take formal class often learn the material very fast and well. Classes do have draw backs as they are expensive and hard to find. They are not offered in all locations. If they are offered they may not cover the material you want to learn. Look carefully at what the class covers before you sign up for it.
Another great way to get Flash training is through books. Books offer a cheap way to learn flash. They are also great because there are many options for you to read, so you can customize your learning curriculum. Sometimes it is hard to find books that are well written and clear. Books take time and there is a lot of technical reading that can discourage many hopeful Flash developers. Books are a great way to get a basic understanding of the material.
Flash tutorials are the most interesting and varied ways to get Flash training. Millions of people post little mini-lessons on things that can be done with Flash. Flash tutorials provide you with the flexibly to learn whatever you want. The draw back is they are not in a standardized format. Their quality is only as good as their author. Flash tutorials are a great way to get Flash training if you have a specific task you want to accomplish. (Link to article the Flash tutorial)
There are many ways to learn Flash. Which one is the best? There really isn’t a best one. The best way to learn anything is to use all of the resources that you have available. Classes, tutors, books and Flash tutorials can all help you learn the skills that you want so use what works best for you in your situation.
|W|P|114484084836292435|W|P|Finding Flash Training|W|P|venkat@sgdnetworks.comProper and regular maintenance of your computer system is simply smart computing. With regular use system folders get cluttered up, files get scattered around and lost, and the registry gets full of unneeded information. Without proper upkeep, simply using your computer normally and properly can end up reducing its performance. Just like your car, your PC needs a regular tuneup in order to work at peak performance.
Norton CleanSweep is a set of tools help you do this regular maintenance quickly and easily. It lets you free up disk space and manage applications on your computer from one simple to use control panel. It is designed to allow you better and safer control over what gets deleted and cleaned from your computer and when. Many people don’t realize that Windows doesn’t do the best job of removing and deleting files and applications. Often files are left on your machine and end up using valuable disk space which impacts drive performance. Worse, often files are often left in the system directories which leads to poor computer performance.
Norton Clean Sweep helps manage both items you manually and those that you remove through Windows’ Add/Remove Programs. By doing this you keep you machine working more smoothly and at a much better level of performance.
Here is a partial list of some of the benefits Norton CleanSweep provides:
Uninstall Cleaners:
* Uninstall Wizard -- Clean Sweep safely removes programs for the safest and most complete removal. Fast & Safe Cleanup—Searches your system finds and deletes specific file types that are known to be safe to remove Internet Cache and Cookie Cleanup—Quickly frees up valuable disk space by removing files from your internet cache and Internet cookies. For example files from websites you visited months ago but never visited again
System Cleaners:
Registry Sweep -- The Windows Registry is a database of configuration information about your computer, programs, and user settings. Many uninstallers do not remove their registry entries. This dramatically reduces performance. The registry sweeper cleans and optimizes your registry
Duplicate File Finder -- Often applications create duplicate copies of files. Often people do it too, quite by mistake. These waste disk space and can impact performance. Norton Clean Sweep finds these and then lets you choose what to do with them (keep, move, or delete).
Safe Cleanup -- This allows you to set certain file types that will be placed into a special ‘holding’ area before being deleted. So if you are a web developer you can tell it to ‘hold’ .html pages rather than directly deleting them. This lets you review files one more time before actually deleting them. You can tell clean sweep any number and kind of files to protect (.doc, .jpg, .mp3, .xls) If you are in an office this is a great way to protect valuable files from accidental deleting.
Overall Norton Clean sweep is a nice addition to the Norton Utilities suite of applications. It is now an integrated part of Norton Utilities and/or Norton System Works. If you are a heavy computer user or run a business, it is well worth the investment.
|W|P|114484072392324702|W|P|Get Control of Your PC with Norton Clean Sweep|W|P|venkat@sgdnetworks.comWhat’s all this test automation about?
Since the millennium bug there has been an explosion in test automation. The expansion of automated tools from vendors such as Mercury Interactive, IBM Rational, Segue and others has really delivered automated testing into the heart of just about every major organisation in the western world. And this can be seen to continue with new development methodologies such as eXtreme programming which has test automation at the heart of its design.
So why Automate? Well, the major benefits are:
Speed
Automated tests can run much faster than the manual equivalent, so more testing can be achieved in a smaller time frame. It is not unusual to see regression suites that take two weeks manually reduced to 24 hours with test tools!
Consistency/repeatability
Automated tests can be repeated over and over and will always perform the test exactly as recorded. Manual testers can easily make mistakes or perform the same test slightly differently when repeated.
Unattended – reduce cost
Once developed, the automated testing can be executed unattended overnight, so repeating the testing requires very little resource or cost.
Audit trail
The tests are stored as automated scripts and the test results are stored for every execution of the tests providing a full audit trail of all testing performed.
Improved Test Coverage
As the test pack develops, more & more tests can be added and as the execution time is much faster than manual testing and less resource intensive, more testing can be completed, ensuring greater coverage of the application under test.
Free up testers to perform other tasks
If the structured testing is automated, testers will hopefully have more time to perform other types of testing (accessibility, usability, ad-hoc/random testing) which commonly get pushed aside.
Some testing may only be possible with automation
For example how do you manually simulate 5000 concurrent customers performing transactions on your on-line web site?
What types of tools are available?
Functional/regression automated tools
These tools capture user interaction with the application under test and can then be replayed. However they go beyond this and allow you to data-drive tests, to capture the state of your application whilst performing business processes and provide fully-featured development environments allowing you to manipulate applications in almost any kind of way. Tools such as Mercury’s WinRunner or QuickTest Professional demonstrate the pinnacle of what these kinds of tools are capable of.
Load/Performance tools
These are used to emulate multiple (concurrent) users performing tasks against your application, for example if your business has an on-line banking system – how many users can it support? What kind of performance will it deliver under load? Where are the bottlenecks? All of these kinds of questions can be answered using automated load testing tools such as Mercury’s LoadRunner.
Test Management
Tools such as Mercury’s TestDirector or Quality Center offer Test Management facilities; a central repository to store test requirements, test scripts, execution results and defect tracking, integrating seamlessly with the automated tools such as WinRunner, LoadRunner and QuickTest Pro.
So what are the pitfalls to test automation?
It is easy for these tools to become ‘shelfware’ as purchasers do not consider the complexity and power of some of these tools. They all share a steep learning curve, so some time and money need to be invested into getting your team up to scratch with the tools.
Some solutions to good automation implementation:
Technical Testers. Ensure your testers have a reasonable grasp of technology, some programming experience would be ideal.
Training, Training, Training. Good training programs are offered for these tools and are well worth the investment. The trainers usually have good project background experience and can demonstrate how the tools should be used and explain the pitfalls.
Hand-holding for the basic infrastructure. Following the training it is well worth getting a consultant in for a few days or weeks to build the basic automated infrastructure, provide on-site training against your application and to develop templates for your team to expand the test automation out from. They can achieve in weeks what could take you months to learn.
Tools such as LoadRunner, WinRunner, QuickTest Pro, TestDirector, Quality Center can provide a great return on investment in the longer term, but to make them effective do invest in training and assistance at the beginning.
|W|P|114484020370603438|W|P|Mercury Automated Testing|W|P|venkat@sgdnetworks.com