Sunday, August 9, 2009

LED Technology

LED technology is the most recent technology in TV industry. LED stands for light emitting diode and it emits electronic light which in result amazing display quality.
LED technology was first invented in 1920 by Russia, but it took quite long when Americans first launched practical electric device using LED technology and in 1962.

Devices invented before produced low intensity red light, but latest and sophisticated LED technology manages to emit visible ultraviolet light, infra red wavelength with very high picture quality and brightness. LED technology is based on semi-conductor diode, when this diode gets active or switched on; energy is released in form of light when electrons are combined with holes. This effect of emitting light is called electroluminescence. LED’s normally are small in areas; optical components are shaped and integrated in such a way that its radiation patterns and reflections remain consistent.

LED offers many advantages over previous display quality devices technologies. Benefits like lower power consumption, smaller size, improve lifetime performance, fast switching etc. On the other hand LED comes with some negative points, LED technology is bit expensive comparing with other light source technologies, and they also require exact electric power and heat management system.

There are many LED applications available today, as mentioned before LED technology based devices consumes very low energy, that’s why it is good replacement for traditional light sources which are used for general lighting. Small size of LED also enables new text and video displays devices.

Friday, April 3, 2009

Laptop Battery Problems

Laptop batteries can be one of the most frustrating parts of an older laptop. They only last 15 minutes, or maybe only 2 seconds, perhaps explode, etc. I created this site to try to document and analyze these problems.
How notebook batteries work
The battery consists of a plastic outer case, metal electrical contacts, an inner metal case filled with a chemical and special electrical contacts called electrodes, and lastly, perhaps some control circuitry.
Note that the actual charging circuit is usually part of the laptop main board.
Battery chemistry
• Lithium Ion (LIon)
• Nickel Metal Hydride (NiMH)
• Others...
Control circuitryDifferent batteries may have none, some, or all of these circuits.
Overheat protection:
A thermal sensor and circuit cuts off charging and/or usage if the battery gets too hot.
Over-current / short-circuit protection:
Like a circuit breaker, if the current is too high this will cut off the electricity coming from the battery to prevent explosion or fire.
Over-discharge protection:
Certain battery chemistry, such as Lithium Ion, will break down if the battery gets discharged below a certain point. This circuit cuts off usage just before this point is reached.
Status meter / battery tester: Many modern battery have a button you can push, and a meter of LEDs will show you how charged the battery is.
Reconditioning: Battery performance can be improved through a process called reconditioning. This is usually a special pattern of charges and discharges designed to get the chemicals back to their original state. I suppose shaking might also be involved, as certain substances may build up near the electrodes inside.Case Studies & Anecdotes
Gataway Solo :
Fully charged, the charging circuit will not reactivate until after you have used the laptop under battery power. However, the battery slowly drains itself over time. The result is that if you have had the laptop plugged in to the AC for too long, the result will be a dead battery. The solution? Unplug the laptop from the AC for just a minute, and then reconnect. The battery will recharge.Additionally, when using the battery, the power level detected by Windows when the computer first comes on sometimes is very low, such as 5%, causing Windows to automatically go back into standby. However, by turning it on again, you discover that now the battery is almost fully changed.
HP Pavilion N5000 series (N5430)
By the end of the first year of use, the battery charge ended up only being good enough for 30 seconds of operation. :-/ Warranty service would have been a good idea.

Wednesday, February 11, 2009

Windows worm numbers reaches millions

Worm infections spreading through computers, networks, pin drives are reaching in millions due to low profile security measures. In October 2008, different malicious computer programs like conficker, downadup and kido were discovered; these are the most common known malicious software attacking our computers. Antivirus firm F-secure estimated the amount of infected machines have reached the figure of 8-9 million. There has been several warning by experts about this figure that it can go far higher and they should install Microsoft MS08-067 patch and keep anti-virus software updated.While in Interview with BBC, Graham Cluley, senior technology consultant told that the situation has never been this bad and outbreak on this scale had not been seen for quite some time. He also told that :

"Microsoft did a good job of updating people's home computers, but the virus continues to infect business who have ignored the patch update."A shortage of IT staff during the holiday break didn't help and rolling out a patch over a large number of computers isn't easy."What's more, if your users are using weak passwords - 12345, QWERTY, etc - then the virus can crack them in short order," he added."But as the virus can be spread with USB memory sticks, even having the Windows patch won't keep you safe. You need anti-virus software for that.
"How worm spread in windows?
Microsoft has release the information about the working of worm spreading in the windows platform. First of all it searched for executable file called “services.exe” and gets embedded into it. “Services.exe” is windows file which performs important functions in windows. It then copy itself into window system folder “system32” with random file name but in extension of DLL file, it can be something like piftoc.dll etc, it normally named itself from 5 to 8 character, after naming it modifies the registry entries, listing important windows settings so that it could run infected ..DLL file as window default system file. When worm is up and running it creates HTTP server, it resets machine system restore point and starts to download files from different hacking sites and or start uploading crucial and personal information like name, password etc. Most malware uses predictable ways to download and upload files which are easy to locate and shut down. Whereas Conficker makes things way more complicated for finding and terminating its actions. According to antivirus firm F-secure this worn is programmed very complicated algorithm which in result generate hundreds of fake domain names such as abed.com,hturp.net etc. Out of which only one domain is used to download or upload data. Finding the site out of so many sites makes detection almost impossible procedure.
Alternatives
Interviewed by BBC, Kaspersky Lab's security analyst, Eddy Willems, said that a new strain of the worm was complicating matters."There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems"The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism.""Of course, the real problem is that people haven't patched their software," he mentioned.According to Microsoft malware has infected millions of computers in almost of every parts of the world including in China, Brazil, Russia, and India having the highest number of victims.

Microsoft also says, they have detected millions of unique IP infected, they can be deinfected but it will bring issue of unauthrized access issue.Recommendations: We have good chances for protecting our computers by making sure that we update crucial security updates at any cost, and we use antivirus programs and keep its signature file updated for maximum protection.