Custom Search

News World

Dec 9, 2009

Hardware : Neural Impulse Actuator

OCZ’s Neural Impulse Actuator (nia) marks a new era in gaming. Rather than being a substitute for a mouse, the nia is a pioneering new peripheral to be used in conjunction with your mouse for a more immersive gaming experience. The nia is compatible with any PC game using keyboard input… past, present, or future. Predefined profiles included with the software allow the gamer to develop their own nia—memory to launch the desired behavior of their character and shoot with the “blink of an eye”, without lifting a finger.

Play Games Using Biosignals
Translate electrical biosignals of your body directly into computer commands and take advantage of total immersion into game play. Customize behavioral profiles of your character and let your subconsciousness take over.

Hone Your Reflexes
Where others have to practice reaction times, you can use reflex-based game play to get the better of your opponents by cutting your reaction time by 50%.

Use Space-Age Technology
The headband uses carbon nanofiber-based sensors to provide the highest possible dynamic range for the recording of bioelectrical signals that are amplified and digitized and further de-convoluted into computer commands.

Become Your Character
Streaming biopotentials into the computer and witnessing real-time feedback through the game will result in a novel way to experience virtual reality. Enter a virtual world where abstractions like keyboard commands are replaced by intentions converted into tensions and translated into command structures.


One Size Fits All
#Powered by USB

Package Contents
#Installation CD
#The nia
#The Headband
#One USB A-to-B cable

System Requirements
#Windows XP + Vista (32 & 64 bit)
#512MB Memory
#USB 2.0 Recommended

Software > Firewall Software Evaluation Center

What Is Firewall Software?

Firewalls enable organizations to maintain the privacy and confidentiality of enterprise information communicated through computer networks. Firewalls limit the information that can be passed from the enterprise to external locations. They work as components of information security systems, or function independently to limit the damage arising from intrusion or malicious software (“malware”) such as viruses, Trojans, and worms. They also serve as a defense against such malware vectors as botnets

Firewall Software Business Drivers and Benefits

Firewall systems help in identifying and analyzing threats to an enterprise’s network security by
allowing secure data transfer from multiple devices and locations on different types of networks
ensuring the safety of valuable IT assets through the use of different security protocols including data encryption, symmetric-key algorithms, and other methods providing a secure connection between terminals or remote offices using an intranet, an extranet, or the Internet supporting business rules or network security rules that identify incoming potential threats and prevent them from entering the enterprise network aiding in compliance with the US Sarbanes-Oxley Act (SOX), and other regulations such as payment card industry security standards automatically analyzing potential new threats to security and notifying system administrators about those threats

Firewall Risks

Organizations without effective firewall systems run the risk of company-wide threats to security:
Unauthorized users, both internal and external, can access private networks through password theft and corrupt confidential information.
Without intrusion protection, external threats cannot be detected and blocked.
Without firewall rule sets and protocols with specific criteria for blocking traffic (“default-deny” rather than “default-allow”), unauthorized traffic can enter the network.

Why Use the Firewall Evaluation Center?

Compare firewall applications to see which ones offer the functionality critical to protecting your IT infrastructure.
Make sure your shortlisted vendors offer not only intrusion detection, but also blocking, encryption, and authentication capabilities that are a good fit for your network requirements.
Shortlist the firewall vendors that allow you to establish business rules specific to your needs.

Read More Here

Dec 2, 2009

Digital Signage > DSP-1

A stylish and snazzy digital signage display produced from 1.0 mm cold rolled steel.

The DSP1 is extremely innovative as if offers a choice of several different size display options.

It can be mounted either by portrait or landscape mode, and it has an option to install a box standard ultra small form factor PC or media player.

The DSP1 is a stylishly produced kiosk which comes standard with wall or ceiling mounts.

Width: 31"
Height: 43"
Depth: 5"

Width: 26"
Height: 47"
Depth: 5"
Weight: V
ariable Power: International 110–240 AC
Power Operating Temperature: 0° – 55° C
Humidity: 10% – 90% relative humidity, non-condensing

ADA Compliant
Weather Resistant

Optional Additions
Hardened 6mm Tempered Glass
TFT LCD & Touch Sensor 22" - 82"
Flight Case
Nema 4 Certified Weather Proof Metal Frame
WiFi (Wireless Internet)
3M Logo Branding

Display Sizes
Size: Resolution:
15" 1024x768
17" 1280x1024
19" 1280x1024
22" 1920x1200
24" 1920x1200
26" 1920x1200
30" 2056x1600 Available
32" 1920x1080 Available
40" 1920x1080 Available
42" 1920x1080 Available
46" 1920x1080 Available
52" 1920x1080 Available
57" 1920x1080
66" 1920x1080 Available
82" 1920x1080 Available

Optional Additions
Hardened 6mm Tempered Glass
TFT LCD & Touch Sensor 22" - 82"
Flight Case
Nema 4 Certified Weather Proof Metal Frame
WiFi (Wireless Internet)
3M Logo Branding

What's in the box
Cabinet Keys
Power Cable
Wall Mounts

from :

Nov 6, 2009

CHIP : Will chip-and-PIN mean fewer transactional kiosks in the future?

Roland Thompson is the director of United Kingdom-based Stream Retail, a provider of digital signage, POS and self-service solutions in the retail vertical.

From a European’s perspective, it is often useful to look to the United States to get a read on likely trends, particularly in the self-service and kiosk industry, as recent figures suggest that more than 50 percent of the worldwide installed kiosk base is in the U.S.

And given today's economic backdrop, we Europeans are keeping a much closer eye on events in the U.S. than before. The old adage, "If the U.S. sneezes, Europe catches a cold," underscores our recent troubles, and as recovery takes hold, we hope activity in the U.S. will give us Europeans a glimpse of the future as we recover from this flu.

And the market conditions for self-service kiosks in the U.S. seem to be very good. The recession is mostly over, but companies will continue to try doing more with a smaller staff. Competition among retailers has never been so high, so an innovative customer offering is important.

Stores are turning to multichannel retailing, and with the kiosk playing an important role in the mix, a greater variety of applications and uses are emerging. The kiosk is no longer just an information tool — it is becoming a transaction tool too.

Kiosks that can take payments — fantastic! This functionality makes kiosks truly useful and increases their appeal 100-fold. Information-based kiosks are fine, but they can only ever take over an isolated part of the retail customer experience. Give them payment functionality and they become a proper retail partner, working alongside the traditional channels like a true team player.

Thus, any European would conclude from their U.S. crystal ball that economic conditions are conspiring in the kiosk’s favor and the scope of its application is widening and driving the industry forward. So we should start preparing to scale.

Or should we? Is what is happening in the U.S. something we can rely upon to happen in Europe? One fundamental difference between the two continents significantly changes the landscape — the rules and regulations governing the ways payments are managed.

The rules governing card payments in European countries are far more stringent than those in the U.S. The main driver is fraud prevention, and it has led to the introduction of chip-and-pin technology for all debit card and credit card transactions that are not Web-based.

There will soon be 40 countries worldwide using chip-and-pin, with Mexico and Canada next on the list to adopt the technology. But as of yet, the U.S. has made no commitment to follow suit. Many banking officials in the country say it does not have the levels of fraud that other countries have to warrant this adoption. Pressure for U.S. banks to make the change is mounting, however, particularly since U.S. citizens are finding it more and more difficult to use their credit and debit cards abroad, since they are not chip-enabled.

So what does this mean for the kiosk? For now, it means that the U.S. is unencumbered by the payments hoops that Europeans and other chip-and-pin countries have to jump through — and there are many.

For example, to allow a “European-style” credit or debit card payment to take place at a kiosk, a deployer must decide upon a chip-and-pin device and then find a payment service provider that has the accreditation to work with that device. Once housed in the kiosk, the payments solution needs the accreditation of the bank acquirer. This final stage is time-consuming and expensive, which means running trials and proving the business case is risky.

On a positive note, there are payments service providers who are getting blanket accreditation to work with all acquirers using a particular chip-and-pin unit. But there are other hurdles. During a recent deployment in Holland, for example, we found that the chip-and-pin device we use in the U.K. was not up to standard, as the LCD screen was too close to the pin pad. Also, the required hardware itself is expensive and changes the whole slope of the business case to a more shallow, marginal one.

Conversely, things are much simpler in the U.S. Many applications, for example, allow retailers to accept a touchscreen signature for a card-based transaction. If you have ever used a stylus on a touchscreen, then you will know your handwriting degenerates into that of a 5 year-old's and looks nothing like your signature. Furthermore, a simple swipe of the card at a kiosk is all that is required to authenticate a transaction in an unattended environment.

Without a doubt, the U.S. has it easy when it comes to offering transactional kiosks, and U.S. deployers will continue to see good growth in this area until the rules change. Opinion is divided on whether chip-and-pin will be introduced in the U.S., but we believe it will begin to be adopted within three to five years, at which point there is likely to be a marked decline in the deployment of transactional kiosks.

Meanwhile, we Europeans will continue to forge a path though the payment jungle and do our best to build kiosk networks that are transaction-based and not just information-based. Who knows, we may even show the way for once and have our American cousins learning and following our lead.

MESSAGE : FlashView-Control Your Message

FlashView is the leader in the Stand-Alone Digital Signage category. These feature-rich units are simple to use, available in 7" and 10" sizes, and have fully customizable interactive options for installation into your point of purchase display. By combining a high quality LCD display and an easy to use media player, FlashView ad players are truly in a class of their own. Designed specifically for the digital signage market, these units are built to last with rugged materials and an industry leading 1 year warranty. Interactive options include motion sensor, buttons, and segmented touch screen, allowing you to interact with your potential customers and guide them to a purchase decision. They are simple to use: just load the flash memory card and plug it in. No computer or network required, so campaign rollout costs are reduced and there are no moving parts to fail. And when you're ready to change the message, just reload the images and videos and plug it in.

FlashView-Control Your Message

  • Available in 7" and 10.1" sizes
  • Easy to use menu system for media playback assignment
  • Rugged metal housing designed for retail environment
  • Timer function to control media playback hours
  • Two speakers with volume control
  • Security door to protect memory card, power connection, and function buttons
  • Up to 8 pushbuttons
  • Motion sensor
  • Touch options
  • Auto start
  • Displays both videos and still images
  • No moving parts to fail
  • 1 Year warranty

Nov 5, 2009

BIOMETRIC : U.S. government driving growth of biometrics in self-service

ABC reports that earlier this year, as part of his administration's efforts to reform the U.S. healthcare system, President Obama pledged to ensure that all medical records in the United States would be electronic within five years. The plan is sure to have far-reaching effects on the healthcare industry as a whole, and it also is likely to create opportunities for technology providers in the space.

Patient check-in kiosks have existed in doctors' offices for some time, but they've not become as ubiquitous as in other verticals yet. But Josh Napua, vice president of kiosk solutions for Fujitsu's Frontech of North America division, says the impending government mandates are likely to drive more deployments.

"Healthcare has always been thought of as being sort of behind on IT technology," Napua said. "But obviously with the infusion of the Obama initiative for electronic medical records, I think there's a growing interest, to say the least, in trying to figure out a lot of these solutions in healthcare."

Fujitsu's latest patient self-service offering, the Med-Serv 50/60 kiosk, incorporates state-of-the art biometric technology, another trend that is picking up speed in the kiosk industry.

The kiosk's PalmSecure palm-vein sensor, which also can be implemented in other hardware configurations, allows a patient to sign in at the healthcare provider's office by simply holding her hand close to the kiosk's touchscreen, which then captures an image of the palm's vein pattern and encrypts it. Fujitsu is working with several medical centers, including a 22-location clinic network in Springfield, Ill., and George Washington University, to execute pilot rollouts of the kiosk, whose hardware is manufactured by KIOSK Information Systems.

Patients can choose to forgo the palm-vein scan and use other methods to sign in, but Napua says providers have been pleasantly surprised to find most users prefer the biometric option.
"At the beginning, the patient always has the option to check in either using their credit card, a password, which is typically a Social Security Number, or a biometric palm (scan)," Napua said. "Ninety-nine percent of the patients have been opting for the palm biometrics."

Another important advantage of the PalmSecure technology is that it can be used to verify the identity of physicians and medical staff themselves to gain access to medical records systems. Napua says this implementation allows for better protection of patients' private and sensitive information.

"One of the problems that has been publicly noted, especially in Hollywood, is the fact that these records are accessible by anybody who's in the hospital," he said.

"They've had problems where people who should not have been were accessing patients' records. So there's another big move for implementing single sign-on solutions, which means being able to use just one security password or biometric to access multiple applications in a hospital or clinic. Because people lose passwords, people lose their badges, people give their passwords to other people, all of that."

And the palm-vein biometric technology, which Napua says is the only one of its kind certified by the international biometric standards consortium Common Criteria, is particularly suited to a healthcare environment because it is contactless and even can capture a person's vein pattern through material, such as a physician's latex glove.

Napua also says the palm-vein scanning is among the most accurate and cost-effective solutions when compared to other biometric technologies. He says fingerprint-scanning, which has been common in biometric deployments thus far, is on the low end of the spectrum in terms of cost but also is the least accurate biometric technology. On the other hand, iris scanning, also a well-known biometric iteration, is the most accurate but also the most costly. Palm-vein scanning, however, accomplishes both goals, Napua says.
"So now position the palm-vein sensor — it is on the low end of that spectrum in terms of cost, competing with that fingerprint sensor, but it is as accurate as an iris scanner," he said. "So you sort of get the best of both worlds with this palm-vein sensor."

Global Entry kiosk program

Another government initiative driving the growth of biometric deployments is the U.S. Department of Homeland Security's (DHS) Global Entry Trusted Traveler program. The project's pilot phase was launched in June 2008 and is now in 20 airports nationwide.

The kiosks employ fingerprint- and iris-scanning biometrics, along with a series of declaration questions, to confirm the identity of registered travelers and move them through customs more quickly and efficiently than the traditional method, where customs agents deal with each traveler individually.

According to a news release from the DHS, travelers who wish to register with the Global Entry program must submit their biometric data, pay a $100 fee and go through a background check and an interview with Customs and Border Protection officers.

As of August, 16,000 members were enrolled in the program and the kiosks had been used more than 51,000 times, according to the DHS. The kiosk and biometric solutions are provided by KIOSK Information Systems and CSC, neither of which chose to comment on the topic for this article.

Digital Signage : NCR buys digital signage software provider Netkey

NCR Corp. announced this morning that it has purchased the assets of Netkey, a digital signage and kiosk software provider based in East Haven , Conn. Terms of the sale were not disclosed.

Netkey’s software platform is used to manage digital signage networks as well as self-service applications like gift registry, guided selling, endless aisle and human resources functions.
Netkey has more than 75,000 kiosks and digital signs installed by more than 400 clients in the retail, finance, transportation and government sectors. Many of these customers also use NCR ’s kiosk, self-checkout or point-of-sale solutions.

NCR will combine Netkey’s software platform with its own software to create an enterprise software solution to accompany NCR’s hardware portfolio and suite of services. NCR will continue to provide multivendor hardware support with the Netkey solution.
Mike Webster, vice president and general manager for NCR ’s retail line of business, commented on the acquisition:

Consumers increasingly expect to interact with companies when and how they wish, and businesses are responding by offering their customers a seamless experience across the channel of their choice. This acquisition will enable NCR to help its customers across multiple industries with kiosk and digital signage solutions that deliver more effective transactions, promotions and information as part of a merged-channel strategy.

Oct 30, 2009


Web-based, User-friendly Bluebee ERP: The TEC Certification Report

Today's feature certification report focuses on Bluebee ERP v4b.08. Learn about this Web-based enterprise resource planning (ERP) solution's highlights, strengths, and weaknesses as brought to light by TEC's rigorous certification process. You'll also get a detailed product functionality analysis, competitive product analysis, and even an analyst's summary of this flexible, user-friendly ERP solution for manufacturers and distributors.

Despite the fact that entire books and training programs have been devoted to lean supply chain practices, there are a few simple steps you can take to lean down your company's supply chain. In today's feature article, learn what these nine simple measures are, and how they can help your company enjoy the efficiencies and financial benefits of a lean supply chain.

Wholesale distributors are facing a number of serious business challenges. In today's feature white paper, discover how wholesale distributors of all sizes are addressing these challenges by implementing specialized ERP solutions.

Read the Certification Report: TEC Product Certification Report: Bluebee ERP v.4b.08

Read the article: Nine Ways to Use ERP to Make the Manufacturing Supply Chain Lean

Read the white paper: How to Optimize ERP to Meet Wholesale Distribution Challenges

Compare ERP Solutions
To compare ERP solutions based on your organization's needs and characteristics (size, industry, business model, geographical markets, IT platform and requirements, etc.), visit TEC's ERP Evaluation Center. It's fast and easy, and you'll get the results immediately.

IBM : Cognos Express (1)

IBM : Cognos Express :BI Expressly for Midsized Companies

If you're a midsized company looking for a business intelligence (BI) solution that's designed and priced for the midmarket—and is easy to install and use—you might want to check out Cognos Express from IBM Cognos. We did, and you can find our report on this modular, Web-based BI solution in today's feature blog post.

Making a mid-market BI solution a success in your organization comes down to knowing which tactics to employ, and how to approach them intelligently. Today's feature white paper lays out the five most critical things you can do to guarantee a successful BI deployment.
BI isn't just for big corporations any more. In today's second feature white paper learn why a BI solution can help businesses of all sizes make better, faster business decisions.

Read the feature blog post: Cognos Express—a New "Big" Product for the Midsized Market?

Read the white paper: Five BI Success Factors for the Midsize Organization: Tactical Guidelines for Effective BI Deployment

Read the white paper: Why BI Is Ripe-Now-for Businesses of Any Size
Compare BI Solutions To compare BI solutions based on your organization's needs and characteristics (size, industry, business model, geographical markets, IT platform and requirements, etc.), visit TEC's BI Evaluation Center. It's fast and easy, and you'll get the results immediately.

IBM: AS/400 (1)

The Challenges of Running ERP on a 20-year-old Computer System
TEC recently conducted an enterprise resource planning (ERP) selection project for a company using AS/400 computer systems—the venerable old workhorses first introduced by IBM in 1988. We were struck—as you will be too—at how "vintage" the user environment is compared with today's modern systems. In today's feature blog post, read about the difficulties in running a modern ERP system on a 20-year-old computer—one that still uses monitors with green-black screens.

Today's second feature blog post offers you a handy road map for successful software selection that comes from a rather off-beat perspective. You'll see what we mean when you read it.
With the high cost of ERP updates and modifications, did you ever wonder what other companies are investing in terms of money, time, and effort to keep their ERP systems up to date? Find out in today's feature white paper.
Read the feature blog post: AS/400 Users' "Phantom Limb" Pains

Read the blog post: How to Select an ERP System When You're Dead

Read the white paper: The High Cost of Change for ERP: What Does It Take to Keep Up-to-date?

Compare ERP Solutions .
To compare ERP solutions based on your organization's needs and characteristics (size, industry, business model, geographical markets, IT platform and requirements, etc.), visit TEC's ERP Evaluation Center. It's fast and easy, and you'll get the results immediately.

Aug 31, 2009



A VLAN (Virtual Local Area Networks Operation )requires a series of configuration steps in order to begin operating. Cabletron Systems VLAN aware SmartSwitches do not default to VLAN mode, and the VLAN operation must be configured and activated through software management.

1. Defining a Virtual Local Area Networks Operation
A VLAN must exist and have a unique identity before any ports or rules can be assigned to it. The Administrator defines a VLAN by assigning it a unique identification number (the VLAN ID) and an optional name. The VLAN ID is the number that will identify data frames originating from,

and intended for, the ports that will belong to this new VLAN.

2. Assigning Ports to a Virtual Local Area Networks Operation
Now that a VLAN has been created, individual ports are given membership in the VLAN. This is accomplished through software management by associating a VLAN ID with each port on the VLAN aware switch. This combination of the switch port’s identification and the VLAN ID becomes the Port VLAN ID (PVID).

At the same time, the Administrator configures any needed trunk ports to consider themselves members of every VLAN. The configuration of trunk ports is very important in multiswitch VLAN configurations where VLAN membership applies to users across several switches.

3. Customizing the Virtual Local Area Networks Operation’s Forwarding List
Once the ports that will participate in the VLAN have been associated with a VLAN ID, the VLAN Forwarding List can be customized. The information in the Forwarding List tells the VLAN aware switch what ports are eligible to forward traffic for that particular VLAN.

4 Customizing the Port’s Egress List
When the VLAN Forwarding List is fully configured, the Egress List for each port may be customized if needed. The entries in the Egress List allow traffic classified into specific VLANs to be transmitted out the port.

5 Setting the Operational Mode
Once the VLANs are in place, the operation of the switch is dependent upon the method of operation specified by the Administrator. All port based VLAN switches can be set to one of two operational modes: Open and Secure. The mode configuration of a switch determines how the switch handles the frames that it receives.

Aug 30, 2009


This chapter describes the operation of a VLAN switch and discusses the operations that a VLAN switch performs in response to both normal and VLAN-originated network traffic.


Port based VLAN operation is slightly different than the operation of traditional switched networking systems. These differences are due to the importance of keeping track of each transmission’s VLAN membership as it passes from switch to switch or from port to port within a switch.


Before describing the operation of a port based VLAN, it is important to understand the basic elements that are combined to make up an 802.1Q VLAN.

1. Stations

A station is any end unit that belongs to a network. In the vast majority of cases, stations are the computers through which the users access the network.

2. Switches

In order to configure a group of stations into a VLAN, the stations must be connected to VLAN aware switches. It is the job of the switch to classify received frames into VLAN memberships and transmit frames, according to VLAN membership, with or without a VLAN Tag Header.


To fully understand the operation and configuration of port based VLANs, it is essential to understand the meanings of several key terms.


A unique number (between 1 and 4095) that identifies a particular VLAN.


A 32-character alphanumeric name associated with a VLAN ID. The VLAN Name is intended to make user-defined VLANs easier to identify and remember.

Tag Header (VLAN Tag)

A field within a frame that identifies the VLAN the frame has been classified into. The Tag Header is inserted into the frame directly after the Source MAC address field. Twelve bits of the Tag Header are the VLAN ID. The remaining bits are other control information.

Tagged Frame

A data frame that contains a Tag Header. The Tag Header can be added to the data frame by a VLAN aware switch to any frame received from a port that is a member of a VLAN.

Untagged Frame

A data frame that does not have a Tag Header inserted into it.


An identification that encompasses a particular switch port’s identification (port 6, module 2) and that port’s VLAN membership. This identification is used to classify incoming untagged frames when they are received.

Default VLAN

The VLAN to which all ports are assigned upon initialization. The Default VLAN has a VLAN ID of 1.

Forwarding List

A list of the ports on a particular device that are eligible to transmit frames for a selected VLAN. The Forwarding List identifies what ports are associated with a single VLAN for frame transmission purposes.

Egress List

A per port list of all eligible VLANs that can be forwarded out one specific port and the frame format of transmissions for that port.The Egress List specifies what VLANs are associated with a single port for frame transmission purposes.

Filtering Database

A database structure within the switch that keeps track of the associations between MAC addresses, VLAN eligibilities, and interface (port) numbers. The Filtering Database is referred to when a VLAN aware switch makes a forwarding decision on a frame.

1Q Trunk

A connection between 802.1Q switches that passes only traffic with a VLAN Tag Header inserted in the frame.

1d Trunk

A connection from a switch that passes only untagged traffic.

Aug 29, 2009


The primary benefit of the port based VLAN technology is the localization of traffic that it provides. This function can offer improvements in security and performance to stations assigned to a VLAN.

While the localization of traffic to VLANs can improve security and performance, it imposes some restrictions on network devices that participate in the VLAN. If a switch is operating in the “secure mode,” a group of users assigned to a single VLAN can communicate with one another freely, but cannot communicate with users on other VLANs without the services of a Network Layer (OSI Layer 3) routing device to make the connection between the VLANs. In the “open” mode, this restriction does not apply.

In order to set up a VLAN, all the network switch devices that are assigned to the VLAN must support the prestandard IEEE 802.1Q specification for port based VLANs. Before you attempt to implement a VLAN strategy, ensure that the switches under consideration support the 802.1Q specification.

Aug 28, 2009


There are a number of different strategies for creating Virtual Local Area Networks, each with their own approaches to defining a station’s membership in a particular VLAN.

1. Port Based Vlans

A port based VLAN switch determines the membership of a data frame by examining the configuration of the port that received the transmission or reading a portion of the data frame’s tag header. A four-byte field in the header is used to identify the VLAN. This VLAN identification indicates what VLAN the frame belongs to. If the frame has no tag header, the switch checks the VLAN setting of the port that received the frame. If the switch has been configured for port based VLAN support, it assigns the port’s VLAN identification to the new frame.

2. Secure Fast Vlans

Cabletron Systems’ SECURE FAST VLAN strategy takes a different approach to creating virtual LANs. In a SECURE FAST VLAN environment, the switches in the network recognize Network Layer routing requests and translate them. Based on this translation, the switches set up a connection between the end devices in the network.

3 Other Vlan Strategies

VLANs may also be created by a variety of addressing schemes, including the recognition of groups of MAC addresses or types of traffic. One of the best-known VLAN-like schemes is the use of IP Subnets to divide networks into smaller subnetworks. These other VLAN types offer performance advantages and disadvantages that can be quite different from those available with the port based VLAN strategy.

Aug 27, 2009


A Virtual Local Area Network is a group of devices that function as a

single Local Area Network segment (broadcast domain). The devices that

make up a particular VLAN may be widely separated, both by geography

and location in the network.

The creation of VLANs allows users located in separate areas or

connected to separate ports to belong to a single VLAN group. Users that

are assigned to such a group will send and receive broadcast and multicast

traffic as though they were all connected to a single network segment.

VLAN aware switches isolate broadcast and multicast traffic received

from VLAN groups, keeping broadcasts from stations in a VLAN

confined to that VLAN.

When stations are assigned to a VLAN, the performance of their network

connection is not changed. Stations connected to switched ports do not

sacrifice the performance of the dedicated switched link to participate in

the VLAN. As a VLAN is not a physical location, but a membership, the

network switches determine VLAN membership by associating a VLAN

with a particular port.

Pincture shows a simple example of a port based VLAN. Two buildings

house the Sales and Finance departments of a single company, and each

building has its own internal network. The stations in each building

connect to a SmartSwitch in the basement. The two SmartSwitches are

connected to one another with a high speed link.

In this example, the Sales and Finance workstations have been placed on

two separate VLANs. In a plain Ethernet environment, the entire network

is a broadcast domain, and the SmartSwitches follow the IEEE 802.1d

bridging specification to send data between stations. A broadcast or

multicast transmission from a Sales workstation in Building One would

propagate to all the switch ports on SmartSwitch A, cross the high speed

link to SmartSwitch B, and be propagated to all the switch ports on

SmartSwitch B. The SmartSwitches treat each port as being equivalent to

any other port, and have no understanding of the departmental

memberships of each workstation.

In a port based VLAN environment, each SmartSwitch understands that

certain individual ports are members of separate workgroups. In this

environment, a broadcast or multicast data transmission from one of the

Sales stations in Building One would reach SmartSwitch A, be sent to the

ports connected to other local members of the Sales VLAN, cross the high

speed link to SmartSwitch B, and then be sent to any other ports and

workstations on SmartSwitch B that are members of the Sales VLAN.

Alarm - Mini Alarm DVR, Wireless and Inteligent Alarm

Chipsilicon Presents World's Best Alarm Systems

For more detailed enquiry on the above products, please visit -

BioEnable Technologies Pvt Ltd, The Avenue, 2B, 2nd Floor, Opp Mega Centre
Pune Solapur Road, Hadapsar, Pune 411028, Maharashtra, India
Tel : +91 20 26810214, 65005360/1/2 Fax +91-20-30225587, TOLL FREE: 1800-209-2131
BioEnable is the - Company Of The Year 2007 for Electronic Access Control System - Frost & Sullivan

TOLL FREE: 1800-209-2131

Jun 1, 2009

File Extension JSON better then the other script source code that use for big data size

JSON Abbreviation from JavaScript Object Notation. File Extension JSON is interchange data format as basically notation in JavaScript. In a few narration said that File Extension JSON better then XML as interchange data format.

Is that true? I tray to make a simple test make sure that issues in ASP.Net Web Service.

How to Run JSON files?

With Windows, Mac OS and Linux Operating System

  • Run with a JSON parser

How to Edit JSON files script?

  • Edit with a text editor (Use the editor file that related in Operating System. )

I’ve use two parameter those are stream transmitted and response time.

I use the Employee object with EmpId data, Name, Sex and Title the first. This object will serialize to JSON and XML as WebService Value return.

namespace JSONSample
public class Employee
public string EmpId { get; set; }
public string Name { get; set; }
public string Title { get; set; }
public char Sex { get; set; }

And then I make the web service with two method that get Employee in format JSON and XML.

sing System;
using System.Collections;
using System.ComponentModel;
using System.Web;
using System.Web.Services;
using System.Web.Services.Protocols;
using System.Xml.Linq;
using System.Web.Script.Services;

namespace JSONSample

/// Summary description for WebService1

[WebService(Namespace = "">")]
[WebServiceBinding(ConformsTo = WsiProfiles.BasicProfile1_1)]
// To allow this Web Service to be called from script, using ASP.NET AJAX, uncomment the following line.
// [System.Web.Script.Services.ScriptService]
public class WebService1 : System.Web.Services.WebService

[ScriptMethod(ResponseFormat = ResponseFormat.Xml)]
public Employee GetEmployee(string EmpId)
var emp = new Employee();
emp.EmpId = EmpId;
emp.Name = "Ahmad Masykur";
emp.Sex = 'M';
emp.Title = "Analyst, Application Architecture";
return emp;
[ScriptMethod(ResponseFormat = ResponseFormat.Json)]
public Employee GetEmployeeJSON(string EmpId)
var emp = new Employee();
emp.EmpId = EmpId;
emp.Name = "Ahmad Masykur";
emp.Sex = 'M';
emp.Title = "Analyst, Application Architecture";
return emp;

And then, create JavaScript code to execute both of method in WebService that created before.

var displayElement1;
var displayElement2;

// Initializes global variables and session state.
function pageLoad()
displayElement1 = $get("ResultId1");
displayElement2 = $get("ResultId2");
function getEmployee() {
JSONSample.WebService1.GetEmployee("894683", OnSucceeded, OnFailed);
JSONSample.WebService1.GetEmployeeJSON("894683", OnSucceeded, OnFailed);

// Callback function invoked on successful
// completion of the page method.
function OnSucceeded(result, userContext, methodName)
if (methodName=="GetEmployee") { // xml
displayElement1.innerHTML = result.documentElement.selectSingleNode('//Name').text;
else { // json
displayElement2.innerHTML = result.Name;

// Callback function invoked on failure
// of the page method.
function OnFailed(error, userContext, methodName)
if(error !== null)
displayElement.innerHTML = "An error occurred: " +

if (typeof(Sys) !== "undefined") Sys.Application.notifyScriptLoaded();

And then ASP.NET AJAX that will registray JavaScript and WebService then WebService can execute with JavaScript by ASP.NET AJAX Proxy Service.

May 15, 2009

ASUS - Graphics Card with Voltage Tweak Technology Launches EAH4770 Series

AMD is making a new addition to its midrange graphics card lineup today with the introduction of the Radeon HD 4770 videocard, based on the companies first 40nm GPU, the RV740. The Radeon HD 4770 strikes a balance between performance and price, coming just under the lucrative $100 mark and slotting in nicely in terms of performance between existing Radeon 4670 and 4850 videocards.

ASUS introduced the new ASUS EAH4770 Series that utilizes the Voltage Tweak technology. With this cutting-edge innovation, users will be able to boost GPU voltages via the SmartDoctor application and enjoy up to an 35% performance improvement with the EAH4770 TOP.

Along with the latest GPU technologies that include a 40nm manufacturing process, DirectX 10.1 graphics capabilities, support for HDMI 1.3, CrossFireX, and Stream technology, the ASUS EAH4770 Series is evidence that high performance gaming and affordability can co-exist without compromise.

Equipped with Voltage Tweak technology and the SmartDoctor application, the ASUS EAH4770 TOP/HTDI/512MD5 raises GPU voltages from 0.95V to 1.2V, boosting GPU and memory clock frequencies from 800MHz to 971MHz and 3400MHz to 4600MHz respectively.

The ASUS SmartDoctor is an industry-leading overclocking utility that works in tandem with Voltage Tweak technology to enable users to manually adjust the GPU voltage on the EAH4770 Series. With just a few simple clicks, users will be able to enjoy astounding voltage boosts and performance upgrades - all without the hassle of re-flashing the BIOS at the risk of damaging the cards, or groping blindly for a overclocking button at the back of the chassis.

ATI's new RV740 GPU is derived from the venerable RV770 core, but clocked at 750MHz and equipped GDDR5 memory that runs at an even 800MHz, giving it a memory bandwidth of 51.2 GB/s. The memory bus on the Radeon HD 4770 is 128-bit wide, which should make for an interesting comparison between it and the popular Radeon HD 4850. PCSTATS will break down all the numbers in a moment, but first let's introduce the videocard sitting on the PCSTATS' test bench today, the ASUS EAH4770 HTDI/512MD5/A.

ASUS' EAH4770 videocard is largely based off AMD's reference design, although it does use a simpler two-slot wide aluminum heatsink in place of the standard ATI thermal solution. It's not pretty but it is quiet, that's what matters most. The EAH4770 is PCI Express 2.0 x16 compliant, comes with 512MB of GDDR5 memory and the usual list of supported features; ATI CrossfireX, HDCP, DX10.1, SM4.1, and Unified Video Decoder 2 for HD content decoding.

The EAH4770 Series also incorporates ATI Stream technology, which utilizes the massive parallel processing power of AMD graphics processors to deliver new capabilities that go beyond the traditional usage scenarios of graphics rendering and video processing.

Model EAH4770 TOP/HTDI/512MD5

  • Graphics Engine ATI Radeon HD 4770 graphics
  • Video Memory 512MB GDDR5
  • Engine Clock 800MHz
  • Memory Clock 3.4GHz (850MHz GDDR5)
  • Memory Interface 128 bit
  • DVI Max. Resolution 2560 x 1600
  • Bus Standard PCI Express 2.0
  • DVI Output Dual DVI-I (Dual Link)
  • HDCP compliant YES
  • HDTV Out YES
  • HDMI Output YES, via DVI-to-HDMI adaptor
  • D-Sub Output YES, via DVI-to-Dsub adaptor
  • Software Bundled ASUS Utilities and driver

Model EAH4770/HTDI/512MD5

  • Graphics Engine ATI Radeon HD 4770 graphics
  • Video Memory 512MB GDDR5
  • Engine Clock 750MHz
  • Memory Clock 3.2GHz (800MHz GDDR5)
  • Memory Interface 128 bit
  • DVI Max. Resolution 2560 x 1600
  • Bus Standard PCI Express 2.0
  • DVI Output Dual DVI-I (Dual Link)
  • HDCP compliant YES
  • HDTV Out YES
  • HDMI Output YES, via DVI-to-HDMI adaptor
  • D-Sub Output YES, via DVI-to-Dsub adaptor
  • Software Bundled ASUS Utilities and driver

May 6, 2009

HDD - Thermaltake BlacX N0028USU Hard Drive Dock

A compact docking station, the Thermaltake BlacX (Model N0028USU) maximizes heat dissipation and exhaust for all 2.5 and 3.5-inch SATA hard drives up to 1TB. The BlacX offers hot-swap capability for rapid multi HDD access and exchange. It supports USB transfer speed up to 480Mbps. The RoHS-compliant Thermaltake BlacX is compatible with both Windows and Mac operating systems and is Windows Vista ready. Its patented design allows you to safely detach SATA hard drives without risking damage. Made of durable ABS plastic, the Blac will keep your hard drive cool and efficient for years to come.

However, also consider where you might need to restore the data. USB is the most universal, in that almost all systems have USB ports. If your system dies, and you need to restore your data, this may be your most important consideration.

  • Patented Design: 2.5” & 3.5” USB SATA HDD Docking Station, Supports All 2.5” & 3.5” SATA Hard Drives up to 1TB !!
  • Patented Design: Safely Detach SATA Hard Drives Without Damage !!
  • Easily Connects All 2.5” & 3.5” SATA Hard Drives


Interface: SATA to USB 2.0

Transfer Rate: Up to 480 Mbps (Max)

SATA Compatible: SATA I & II

HDD Compatible: - All 2.5" or 3.5" SATA HDD up to 1TB

OS Compatible: - Windows Vista / XP / 2003 / 2000 ; Mac 10.3 and later

RoHS Compliance: Yes

May 5, 2009


Super Power Saving 1U and Super Quiet Compact Server

RS100-X5/PI2 dedicated for home users, SMB, SOHO, IDC, TELCOM and client system requiring quiet working environment and a super quiet and space-saving uni-processor (UP) server featuring with low power consumption.

Nevertheless, ASUS is still able to offer a compelling business solution through support for Intel’s 65W dual core Xeon 3000 series processors. The onboard 945GC chipset and ICH7 I/O controller are pulled from Intel’s desktop lineup but in this case serve the power-sipping platform well. Two DIMM slots take up to 2GB of DDR2 667 memory, a pair of SATA connectors hook up to internal drive bays, and a pair of Marvel Gigabit Ethernet controllers allow a variety of network confi gurations. There’s even a single PCI Express x16 slot (with a x1 electronic link) for add-in expansion. A thoroughbred the RD100-X5/PI2 is not. However, as an attractive, quiet, entrylevel server that won’t gulp down the power, yet still delivers a reliable experience through an Intel Xeon processor, ASUS’s box is ideal.

Processor / System Bus

1 * Socket 775
Dual-Core Intel® Xeon® 3000 series (65W)*
Dual-Core Intel® Core2Duo (65W)*
Intel® Intel Conroe-L 400 series
FSB 1066/800/533

Core Logic

Intel® 945GC
Intel® ICH7


Total Slots: 2 (2-channel)
Capacity: Maximum up to 2GB
Memory Type: DDR2 667/533 Non-ECC Unbuffered DIMM
Memory Size: 512MB, 1GB

On Board I/O

1 * External Serial Port
2 * RJ-45 ports
4 * USB 2.0 ports (Front * 2, Rear * 2)
1 * VGA port
1 * PS/2 keyboard port
1 * PS/2 mouse port


Fanless Intel® Atom™ Processor Embedded System


§ Intel® Atom™ Processor N270 1.6GHz fanless system

§ Four USB 2.0, six COM ports for peripheral devices

§ Dual GbE LAN Ideal for high speed network application

§ Storage support for both CompactFlash and SATA hard drive

§ 12 VDC, 9 VDC - 36 VDC input models available


Model No. ECW-281B-ATOM


Processor. Intel® Atom™ Processor N270 1.6GHz with 533 FSB

Chipset. Intel® 945GSE + Intel® 82801GBM/ICH7M

System Memory. 200-pin 1GB DDR2 SDRAM SO-DIMM

Ethernet. Dual Realtek RTL8111CP GbE controllers

Display. CRT interface intergrated in 945GSE with one VGA port.

USB. 4 x USB 2.0

Serial Port. 6 x RS-232

Audio. 1 x speaker out

Storage. 1 x 2.5” SATA HDD capacity, 1 x internal CompactFlash slot

Power Input. 12VDC in with DC jack and 3 pin terminal Block; WD series input voltage: 9V~36VDC

Power Consumption. 19W

Chassis Construction. Aluminum Alloy

Operating Temperature. -10°C~50°C with hard drive; -10°C~60°C with CompactFlash

Operating shock. Half-sine wave shock 3G; 11ms; 3 shocks per axis

Operating Vibration. MIL-STD-810F 514.5C-1 (HDD); MIL-STD-810F 514.5C-2 (CompactFlash)

Weight (Net/Gross). 2.1kg / 3.9 kg

Dimensions (DxWxH). 132mm x 229mm x 64mm

Mounting. DIN mount, VESA 100 wall mount

EMC/Safety. CE, FCC class A

Model No. ECW-281B-ATOM-W


Processor. Intel® Atom™ Processor N270 1.6GHz with 533 FSB

Chipset. Intel® 945GSE + Intel® 82801GBM/ICH7M

System Memory. 200-pin 1GB DDR2 SDRAM SO-DIMM

Ethernet. Dual Realtek RTL8110SC GbE ; Built-in 802.11b/g wireless

Display. CRT interface intergrated in 945GSE with one VGA port

USB. 4 x USB 2.0

Serial Port. 6 x RS-232

Audio. 1 x speaker out

Storage. 1 x 2.5” SATA HDD capacity, 1 x internal CompactFlash slot

Power Input. 12VDC in with DC jack and 3 pin terminal Block; WD series input voltage: 9V~36VDC

Power Consumption. 19W

Chassis Construction. Aluminum Alloy

Operating Temperature. -10°C~50°C with hard drive; -10°C~60°C with CompactFlash

Operating shock. Half-sine wave shock 3G; 11ms; 3 shocks per axis

Operating Vibration. MIL-STD-810F 514.5C-1 (HDD); MIL-STD-810F 514.5C-2 (CompactFlash)

Weight (Net/Gross). 2.1kg / 3.9 kg

Dimensions (DxWxH). 132mm x 229mm x 64mm

Mounting. DIN mount, VESA 100 wall mount

EMC/Safety. CE, FCC class A

May 1, 2009

Fiber Optic Ethernet Switches 16-Port 10/100 Fiber Optic Switch With Management; S71650

15 UTP ports; 10/100 auto-sensing and auto-negotiating; 1 fiber port 100BaseFX; ST, SC connectors; multimode/singlemode; Distances to 15 km


  • Provides 15 10/100Mbps switched ports and
    1 100Base-FX switched port shared with TP port 16
  • Complies with IEEE 802.3 10Base-T,
    802.3u 100Base-TX and 100Base-FX standards
  • Each TP port supports both 10/100Mbps auto-negotiation
    and auto-MDI/MDI-X connection
  • Supports duplex operation for each port
  • 2K MAC addresses and automatic MAC address learning and aging
  • Store-and-forward architecture
  • Broadcast storm protection
  • Supports full-duplex flow control (IEEE 802.3x)
  • Supports VLAN function, 15 groups of VLAN switch selectable
  • Supports QoS function, the tag in an Ethernet packet contains VLAN
    and priority information of packets. Per port provides 4 transmit queues.
  • Supports Ethernet frame up to 1522 bytes
  • 19" rack mountable


  • Fiber Port: Multimode/Single Mode Duplex ST or SC connector
  • Fiber Media: Multimode: 1300nm 62.5/125µm fiber cable (2km max.) Single Mode: 1300nm 9/125µm fiber cable (20km max.)
  • VLAN: 15 groups set by dip switch
  • Standards: IEEE 802.3 10Base-T Ethernet, IEEE 802.3u 100Base-TX, 100Base-FX Fast Ethernet
  • Filtering Address: Unicast/Multicast/Broadcast address: 2K MAC addresses per unit
  • Filtering Rate: 14,880 pps for Ethernet, 148,800 pps for Fast Ethernet
  • Forwarding Rate: 14,880 pps for Ethernet, 148,800 pps for Fast Ethernet
  • Connector: Shielded RJ-45 jack
  • Cables: 10Base-T: Cat. 3, 4, or 5 UTP cable (100m max.) 100Base-TX: Cat. 5 UTP cable (100m max.)
  • LED Indicators: Power status, Link/Activity, Full Duplex/Collision status for each port
  • Environment: Operating Temperature: 0º C to 50º , Storage Temperature: -40º to 70º C
    Relative Humidity: 5% to 95% non-condensing
  • Dimension: 16.9 x 4.1 x 1.7 inch (430 x 105 x 44 mm)
  • Power: 100-240 VAC, 50-60 Hz, 16W (max)


  • S70053, MM, ST, 2 km
  • S70054, MM, SC, 2 km
  • S70055, SM, SC, 20 km

IT Conversations

Moneycontrol Latest News

Latest new pages on Computer Hope

Latest from Infoworld

Door Lock

Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now