The characteristics of counterfeit computer components

PROCESSOR
Processor counterfeit / remark / overclock usually sold in a condition TRAY / without BOX. Processor False besides low performance, low-level stability as well, this is caused because the processor is usually in the overclock, so the heat generated is high, which in turn makes the computer unstable / frequent hangs. The warranty period is usually at the latest counterfeit processor is only one year, and the price is cheaper than the
original processor. The most effective way to distinguish genuine and fake is the processor, check the warranty period (the original Intel / AMD original warranty 3 years), then check numbernya serial, serial number should be the same as those written on the box processor.
MOTHERBOARD 
MOTHERBOARD COUNTERFEIT / RECONDITIONING usually sold without mention of its brand, and only mentioned type of chipset, even sometimes sold as well as the second item. An effective way to avoid counterfeit motherboard is to ask the brand motherboard, motherboard warranty period, and asked all the completeness of these motherboards at the time of purchase, such as the motherboard box, cd driver, installation guide, and so forth. Another way is to look at the motherboard serial number, serial number written on the motherboard should be the same as it says on the box. The warranty period must be at least 1 year with a minimum guarantee was removed and replaced the first 3 months new.

VGA CARD
Just as with the motherboard, VGA fake usually sold with no brand and it only mentioned the type of chipset. How to avoid false VGA same as above, namely asking VGA brand, ask the warranty period, ask the completeness of these VGA (box, CD Driver, and a manual) and check the serial numbernya. Another way is to do a cross check to the VGA card manufacturer's website, because there are some false VGA in Yogyakarta are sold under the brand famous, while the factory itself does not make a VGA card with these types. The warranty period must be at least 1 year with a minimum guarantee was removed and replaced the first 3 months new. 

CDROM / DVDROM / CDRW
how to distinguish and avoid the same as above. 

HARD DISK
Hard Disk Original Warranty = 1 year immediately replaced broken new. 

MEMORY
Same as above. The difference is, the original memory is always a lifetime warranty / Life Time, in other words, if broken will be directly replaced new. Here below are the details of the warranty period of the various peripherals of the original / original: Processor Intel (Celeron and Pentium 4) = 3-year warranty was removed and replaced the new AMD processor (Athlon XP, Sempron, AMD64) = 3-year warranty was removed and replaced a new motherboard ASUS = warranty 2 years, 3 months was removed and replaced new GIGABYTE = 3-year warranty, 1 year removed and replaced a new motherboard ECS = warranty of 5 years, 3 months new PC motherboard replaced damaged PARTNER = 2 year warranty was removed and replaced a new motherboard DFI = warranty 1 years, 3 months was removed and replaced a new motherboard Intel = Warranty 2 years, 3 months broken new etc. replaced at least one year warranty, 3 months was removed and replaced with new.

How to Secure Online Shopping. It must be understood!

Shopping via the Internet was very enjoyable. You can just click and the goods will be sent to your address. If shopping from online stores overseas may be slightly longer delivery time but when you are shopping from local stores or in any country in one night can we receive the goods. Shopping online is much easier than when we order fast food like KFC 14 022. As I said before you just click, select the item or product that you want
and pay. So easy it is to the point that many people are addicted to online shopping this way. Culture online shopping has become a habit even a 'normal' in a country like America, Canada, Australia and Europe. The way online shopping is very popular abroad because in addition to simple, can also save time and especially you do not need to spend more transportation costs. Well .. Trouble is, online shopping is very risky, full of
danger and a lot of holes. Yes, many gaps in the internet which can be used by bad guys to cheat and take advantage. Especially if we're not careful, careless and lack knowledge about how online shopping is safe.    In order for your safe online shopping please note: 1. Permalink URL or address of the online store. Check whether it is correct, no typo or less letters. Check her url, so it is not the url that appears, the source url can be viewed by right clicking view source continued. When you click the online store website address from email or the web / other blogs make sure it matches the URL that appears at the bottom of your browser window. Get used to bookmark the site address or the online store shopping so you do not have to retype it again and risk a typo when you want to visit the site. 2. Note the 'Secure HTTP' where usually the url address of the online store when you log in there is 'https' or key images in the browser's address box, for example: https: / / signin.ebay.com /. This menadakan that the data will you enter such as usernames and passwords will be encrypted (encoded) so that the possibility of password theft can be prevented. 3. Use your PayPal account than credit card. With PayPal you do not need to directly expose your Credit Card. Shopping with credit cards are actually very safe from that in mind no.1 & 2 above and keep kerahasiaaan last 4 digits of your credit card number. Obviously you should never use debit cards for online transactions on the Internet. Sometimes overseas debit card transactions can be used online. 4. In particular merchant or online store at the time of registering for the first time we are asked to enter certain information such as the security question, complete address, zip code etc. The simple but important fact. The contents of this correctly because you can use to claim that you are the one who actually has the account of a time when your account was hijacked by someone else or using that is needed. 5.Gunakan password and security question is complex but easy for you to remember. Use a combination of uppercase and lowercase letters, punctuation, numbers etc.. 6. Shopping in a reputable or trusted. If you find a new online shopping site you might be able to ask it to your friends or looking for his review on the internet. Right now you can also shop with mobile applications in mobile phones. Mobile app is so far the application is authorized and trusted applications can you use such as shopping via the BlackBerry App World, of course, safe. 7. Be careful with SMS. SMS text uses the data path that is not encrypted so it is not safe. Never send important information via SMS. 8. Note the transaction on credit card account or your savings account. Usually the bank has created a specific system to minimize the abuse of accounts by people who do not have the right but we still have to be careful. Do not hesitate to call your bank if it determines that unusual transactions or unusual. And the last thing you must remember, always sign out when they are accessing your account including email, forums such as Kaskus, Facebook, Twitter, etc.. It originally was used to bother but if it will feel easier. Also set your browser to 'Private Browsing' or select 'Do not remember history'. Most browsers such as Mozilla Firefox and Apple Safari already has this feature.

Antibiotics are not the candy! Proper utilization and negative effects when consumed Gratuitous

Have you one day suffer a mild flu or influenza, and with his own initiative to buy antibiotics at the pharmacy or drug store? If yes, it's time you leave the habit. In addition to ignorance, still considered expensive treatment to the doctor the reason for treating the patient himself. Not to mention regulations and oversight of pharmacies that are not serious by the government resulted in the patient can be bought directly using the
medicine without a prescription. Even more alarming is his own doctor prescribe an antibiotic that did not have clinical indications. Excessive antibiotics and without any indication in the end will harm the patient himself and the medic because it will increase the resistance of germs. Of
course health care costs will increase as well. Although the development of antibiotics has become very advanced but also the occurrence of resistance is so alarming that it should not be underestimated. Indiscriminate antibiotic will also kill bacteria that normally exist and play a role against the development of balance with bad bacteria that can invade the body at any time. In children, antibiotics are not appropriate indication will reduce your child's immune resistance against infections that his body will be weak. As a result, children will be easily attacked by the disease although the disease essentially actually be combated by the immune system. Keep in mind also that the antibacterial properties of a different antibiotic with other antibiotics. There are special antibiotics that treat this disease and there are special antibiotics to treat the disease. So if the user did not recover any other illness will cause cross-resistance. One time the disease has attacked the antibiotic does not work anymore. Here are the things that should be considered when using antibiotics: 1. Use antibiotics only for indication. If the disease is the cause rather than bacterial infections like the common cold, fever or a mild cough and a new place. Consult with your doctor to get proper treatment. 2. When taking antibiotics, take medicine until it is completely healed and with a dose as recommended by dermatologist. Taking antibiotics that are not completely due to feel healed but still there are bacteria living increase resistance. 3. Ask your doctor about which you are suffering from infectious diseases caused by bacteria or viruses. If the cause is a virus and doctors refused to prescribe antibiotics brave. Request a prescription vitamin would be more beneficial for you. 4. Use the appropriate antibiotics keperluannya only (according to the disease), if it is found in your home is available antibiotics remainder went to the doctor yesterday should not be used again. Maybe your disease is now the cause is different from the first.

titan, the world's fastest computer

Title of world's fastest computer was taken back to the United States. A super computers made by the U.S. Energy Department official was elected as the world's fastest computer. Similarly, researchers from PhysOrg.com presented, Thursday, March 24, 2011. The computer was named "Titan". His ability is estimated to have a speed of 20 000 trillion calculations (calculations) per second, equal to 20 petaflops per second. This speed is ultimately shift the super computer made in China,
Tianhe-1A, which had previously been in the top position since November 2010. At that time, computers made by China's National Defense University has recorded an equivalent speed of 2.5 petaflops. Titan, which was developed by Cray Computer, for the first time become part of the ranks of the world's fastest computer in the facility Oak Ridge
National Laboratory, Tennessee. In these facilities, laboratories ranks the world's fastest computer will be aligned with the lab of National Geographic, Gaea Atmospheric Administration, National Science Foundation Kraken, and the U.S. Department of Energy lab development, Jaguar. Going forward, Titan will likely be used by the local Department of Energy to calculate the complex energy systems and government cost of U.S. $ 100 million, equivalent to Rp 870 billion. The first stage of computation using the Titan is expected by the end of 2011. The second phase followed in subsequent years.

Listening to music can Interfere addiction Hearing Health

I just read an article in one magazine as saying that "there is estimated 5-10 percent of the enthusiast who listen to music mp3 music mp3 player from them for over an hour each day has the potential to have problems or permanent hearing loss." Emergency! ! Moreover, approximately fifteen minutes ago I was listening to music mp3 from your laptop by using earphones. Actually this is not new info. Our first ever taught in both the ENT (Pathology Nose, Ear and Throat) and SME (science of Public Health) on health-especially the work-that there is something called nerve deafness or a medical term sensory-neural deafness. A type of deafness that is different from other types of deafness, conductive deafness or congenital deaf-where there is damage to the nerves and usually permanent. In a person suffering from type of deafness / hearing loss will not be able to hear sounds at certain frequencies. Well what can we do so we do not experience this type of interference pendegaran. Maybe this will be difficult for us primarily music junkie who has become a habit attached
headset, headphones or whatever the name is in our ears, let alone this is not unusual anymore, try to see the bus, busway, bus stop, aircraft etc., so many who use it. Yeah this is the iPod era, not its time again to bring a tape composition major at the shoulder. Moreover, by using heaset we can enjoy the music that we like without disturbing others around us. The following may be useful for me and you without need to leave this habit:
1. The first course is to set the volume of mp3 player you are at a level that is not too high. On the mp3 player like the Creative you can activate the mode 'smart volume' than the sound output on the headset is not noisy results are also more pleasant to hear. 
2. Enable or settings in your mp3 player to turn off automatically after a certain time, which is important no more than an hour! Can you set 45 minutes or half an hour. All handsets are now in general already have this facility, the Sony Ericsson Walkman mobile phones exist, such as in the Creative Zen Vision: M also exists, called 'idle shut down'. This applies also for those of you who work in noisy places such as factories, aircraft parking attendant-hehehe ... what ya call it? - Etc., use a silencer in the room and avoid the sound source is more than an hour. 
3. I thought it wise to use a regular headset rather than the in ear,-you know? - Other than price in-ear headset is much more expensive, would also be better for our hearing health. If forced to use it, use that has air holes on the outside so the excess votes will not burden your ears. Even specific brands like Sennheiser has a certain facility by pressing a certain button you will be able to listen to voices outside without removing Headsetnya from your ear. 
4. Avoid its use during a landing or take-off.

How to Uninstall Program or Application on Mac OS to really clean

Some of our current habits will uninstall an application or program in the Mac OS is by dragging it to the trash. This method is not really clean up the program / application from the hard disk moreover there are some programs that can not be uninstalled this way, the icon of the application can still be found in the Application folder. To completely uninstall a program on the Mac to the net we could delete the application, to track their application files and delete its preference files. Or more simply use the Uninstaller application for the Mac as AppCleaner, AppTrap or AppZapper which I think is quite good and free. Other applications such as CleanMyMac also very nice but you have to buy his license to be able to use it.

kaskus.com 

Systematics MAKING SCIENTIFIC WORKS

1. Title of Research

2. Abstract Abstract is a brief explanation about the essence of research papers consisting think - about     200-300 words.

3. Preliminary exposure of the background information and issue identification.

4. CONTENTS Contents or discussion consists of: - Materials and research methods used. - Description pelaksaaan.

5. Closing the cover contains the following: - Results of research and discussion. - Thanks to those who helped

6. Reference

how to Jacks Energy with Color Therapy

Without realizing it, the colors can affect your life in some way. Colors can make you feel better, increase energy or can actually give the effect of depression. For example, people who worked as a marketing use color to sell their products, and foods that have a certain color can increase your appetite. Color is a basic human need. Color can be described as music for your eyes, and send positive signals to the brain. Color can be used as a medium for healing mind, body and soul are often called chromotherapy. Each color has a different frequency and bring healing specific ways, such as green and blue colors are soothing. Want to do chromotherapy? You only need to use certain colors in various ways, such as: 

1. Difficulty in concentrating? Use a yellow color. Yellow color proven to improve concentration, memory, and confidence. Put the yellow objects in your workspace, and write something on paper yellow. 


2. If you are facing these days are very busy and you really need the extra energy, use orange clothing. Use black if you want to show the spirit of strength and power. However, If you want to get the idea of ​​a neutral, impartial, and be a good mediation, use the color gray. 

3. After a day of work, you also need a quiet atmosphere in the house. Use a green or blue color to relieve stress and support the quality of your sleep. The colors are also very good for a hyperactive child. 

4. Each time you visit a fast food restaurant, you will see decorations that are filled with bright colors and cheerful. Bright colors like red, orange, and yellow have been proven to stimulate the nervous system and increase your appetite. If you have children that are difficult to eat, serve the child with food that is placed on a plate with bright colors. Give them foods that contain lots of red, orange, and yellow. But, it is necessary that you know, never decorating your dining room by using the color pink because according to the color study is thus reduces appetite. 

5. Too much use of red, brown and maroon to put pressure on you. Although it is a very good background color, remember to always balance it with a neutral or pastel shades. 

6. Toska Green is the color of communication. Highly recommended for use during interviews and presentations at when you should speak with clarity, and confidence. 

7. Pink and red is the color that symbolizes love. Not only can increase heart rate, pink also energizes the heart chakra. The color is ideal to use on a date or time as a bedroom decor.

Cerita perjuangan se'ekor burung yg luar biasa

Cerita yang dituangkan melalui gambar ini  sangatlah dalam maknanya, yaitu tentang kesetiaan seekor burung jantan kepada betinyanya..inilah ceritanya..

Seekor burung betina terkapar di pelataran dengan kondisi tubuh yang sangat lemah..
 
 


Lalu Pasangan jantannya datang dengan membawakan makanan dan memberikannya kepada sang betina dengan kasih sayang dan haru.


Ketika sang jantan sedang memberi makan kepadanya, tak lama kemudian sang betina mati terkulai. Sang jantanpun terlihat sangat terpukul dan berusaha mendekatinya dan mengangkatnya.

 

 Sang burung jantanpun akhirnya menyadari bahwa pasangan yang dicintainya telah mati. Ia kemudian terlihat sangatlah sedih,mungkin juga pejantan tersebut menangis di hadapan pujaannya yang telah terkapar mati kaku.


Sambil berdiri di samping tubuh sang burung betina, sang jantan kemudian “berteriak” dengan suara yang sangat menyedihkan.


Akhirnya sang burung jantan menyadari bahwa pasangan yang dicintainya telah meninggalkannya dan tak akan bisa hidup kembali bersamanya. Ia berdiri disamping tubuh sang betina dengan sedih dan duka yang mendalam.



Semoga ada hikmah yang dapat di petik dari sepenggal cerita diatas.......

4 Hacker The Most Respected in the World

Computer World is an equipment that can not be categorized as a strange but true thing, where everyone in the world can interconnect with each other, Even World Computers are currently used as a tool that must be owned by a company even almost all jobs now can be dealt with using a computer, and almost all systems controlled by computer technology Related Problems are built with computer, each person who already understand the computer always wanted to try to find weaknesses of the system that created .. or commonly known as the World of Hacking ... hackers have been known since the computer, and they began more rampant since the internet. Here are some of the most in Segani Hacker in the World:

1. Yunus Attsaouly A.k.a Irhaby 007

Who Irhabi 007? What he had done so his name became legend? Why did he do all the things you can say risky? Since when identity is known in general? At first, the name of Irhabi 007 is only known in cyberspace. Irhaby means the terrorists and 007 is well-known figure for the British royal secret agent (the movie) named James Bond. But Irhabi 007 is not defending the Queen (UK) but to fight. Irhabi 007 is known as one who is very active in cyberspace, particularly in the cyber jihad. Irhabi 007 can be said is always in a state on line, 24 hours straight. Irhabi 007 is known as a sympathizer of Al Qaeda who is also a computer scientist and cyber world. Every day Irhabi 007 with Internet activities, such as to convert the videos, including videos of jihad that can be displayed on site. It was obvious that Irhabi 007 is a lot of mastering information technology issues. One of the most prominent activity is to make a site with a name and an administrator Forum youbomit Al Ansar Al Islami is very prestigious because it involves approximately 4500 members who are mostly Mujahideen. No one knows exactly when the name Irhabi 007 poor across the universe began Cyber ​​Jihad. The appearance of his name was not immediately able to confirm where their existence. It also is one of expertise Irhabi 007. However, activity could be detected Irhabi 007 began in 2001. 007 Irhabi activity increased simultaneously with the start of the American invasion of Iraq, in 2003. At that time, Irhabi 007 began actively uploading pictures of Iraq war on the internet. In that year he also began to publish the materials, including how to hack a computer. In fact he also has written his method into a book. Activists and the Mujahideen are active in Islamic forums began to recognize and be amazed at the skill and courage Irhabi 007. The enemy, America and its allies also began to realize the existence of Irhabi 007, that from the name alone is enough to offend them. So the hunt began to Irhabi 007!

2. Kevin Mitnick (born 6 Agust 1963)

Kevin is known for his action is quite horrendous hackernya America, and represents "the most wanted computer criminal in United States history." The story of his life had been filmed as much as 2 times in Hollywood, with the title 'Takedown' and 'Freedom Downtime'. Kevin started first hackernya action against the transportation system in Los Angeles. After breaking into the system 'punchcard' (subscription card readings bus), she can wear a bus anywhere for free. Kevin next action is to break the telephone system, in which he can use long distance telephone service for free. After identifying a computer, Kevin had to do hacking on: - DEC (Digital Equipment Corporation) System - IBM Mini Computers at the 'Computer Learning Center of Los Angeles' - Hacking system, Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens - Kevin was finally able to fool the FBI caught and serving a prison sentence of 5 years. He was only released in 2000. After his release, he was not allowed to use telecommunications equipment and telephone until 2003. After Kevin sue their rights in court, he finally allowed to use communication devices and computers. Currently, Kevin works as a computer security consultant.


3. Adrian Lamo (born 1981)

 Adrian is a journalist and a hacker predicated 'gray' (can be good, be evil), mainly known in the hacking series komputeryang network has high security. Himself has become a popular man after breaking into computer systems 'The New York Times' in 2002 and 'Microsoft'. He is also known to identify deficiencies in computer network security from companies included in the list of 'Fortune 500 companies' and then tell them the weaknesses and gaps that he found. This case was investigated by the FBI for 15 months, after the New York Times reported the existence of an uprooted their systems. Finally, note in 2003 that the cause is Adrian. Adrian was hiding a few days, and finally surrendered to the FBI in 2004. Adrian eventually have to undergo punishment 'house arrest' by her parents, and 2 years probation with fines of about $ 65,000. Adrian is also believed to be trying to break sistemkomputer Yahoo, Sun Microsystems, Bank of America, and CitiGroup, to exploit security gaps that exist.

 4. Jonathan James (born 12 December 1983)

 James is the youngest U.S. man convicted of cyber crime world. When a new age of 16 years he was sent to prison for hacking into U.S. defense department website. Himself admitted hacking is a challenge and is one of pleasure. NASA also sap the fruits of keisengannya, James managed to steal (download) NASA software that is worth an estimated $ 1.7 million U.S. dollars in 1999. NASA should be forced to shut down the servers and systems result from the actions of the James for three weeks. And after that NASA should spend sekiatar cost $ 41,000 to fix the system is uprooted. 6 months after hacking into NASA's James, he was arrested at his home by local police at 6 am. He is serving a prison sentence of 6 months because it is still a minor, and suspended sentence 'house arrest' to reach 21 years old. James was not allowed to interact with the computer that long. James died on May 18, 2008, no information on what caused his death. Even dizaman increasingly sophisticated as it is today can be expected there are millions of people who always struggled in the World of Hacking, even they are now working in groups or joined in a community that is always trying to find the weaknesses of a system which in Create, with different goals depending on their wishes.

The first bike in the world with wireless system


Consider the bike over, what's weird? The answer is the absence of any cable that milling on the bicycle frame. Shadow eBike is the world's first electric bike with a wireless system (wireless) which utilizes 100% of wireless technology for the operation of all existing systems.



 By utilizing 2.4GHz wireless technology, all systems are using wireless systems ranging from electrical machinery turning, braking until the replacement tooth. Through the control center called "Daymak Drive controller" all controlled through this tool. If your question is where the engine and batteries to power them then the answer is in the second part of the wheel.

 
 In the Shadow eBike also available USB port so you can recharge gadgets through a battery in it. This electric bike electric engine with a capacity of 250 W or 350 W with 36 V 10 Ah battery that can be used to run as far as 20-25 km to completely refill or 35-40 km with the help of the pedal while the rechargeable battery takes 4 - 5 hours. Actually, no wonder also still in line with the growing wireless technology but we are really quite horrified when the brake aja yah also rely on wireless technology, you can imagine if the wireless system is problematic in the middle of the road as the battery runs out or there is a sudden frequency interference. But if you want to look cool aja yah can, prepare a cash of about U.S. $ 2,000 (nearly USD. 20 million) to buy Shadow eBike which will be launched this April.

The new findings effectively and efficiently to prevent fires

Jakarta - A group of scientists Siam Safety Premier Co.., Ltd. has conducted research for many - years to develop an effective system of fire prevention & efficient The scientists succeeded in creating a fire prevention tool that works automatically, without electricity, without human assistance and without the help of support tools other. This tool is named Elide Fire, 14.5 cm diameter spherical weighing only 1.3 kg. The inventors believe Elide Fire could help the world community in combating the danger of fire is increasingly worrying the whole world. This phenomenal discovery rewarded prestigious awards from the World
Intellectual Property Organization (WIPO), Brussels Eureka Award & 15 other prestigious awards. Currently Elide Fire believed would become a new paradigm in the management of fire danger throughout the world. This discovery has got an international patent PCT by 142 countries in the world. Inventors Elide Fire stated that this tool could be designed to effectively prevent fires due to extinguish the fire as a child (initial fire), so the fire did not occur. Currently Elide Fire has been present in Indonesia. You can visit www.elidefireindonesia.com for product information Elide Fire.

speed internet connection without software

for friends who feel at home internet connections running slow like snail alias, there are tips speed internet connection without the software. Immediately ....

The first way
1. open explorer ....
2.klik right of my computer ....
3.klik properties .....
4.pilih hardware ...

5.klik device manager ....
6.pilih then click Comunication ports port (COM1) port
7.buka setting .... 8.ganti bits per second to 128 000
9.dan replace the hardware flow control ....


For the second way
1.Klik Start
2.klik Run
3.Insert gpedit.msc Code
4.Computer Configuration Templates
5.Administrative Templates
6. Network
7. Qos Packet Scheduler
8.Limit Resevable  Bandwidth (double click ..)
9.atur to enable the setting and content of the bandwidth limit with 0% click Ok.

good luck,......

differences Intel Core i3, Core i5 and Core i7

Intel has released a new processor the Intel Core I3, I5 and the Core i7. But still few people who know about the differences of the three processors. Here we will discuss three different processors. I3 made for Entry Level, Core i5 to Mid Level, while the Core i7 is made to the High Level. In addition, i5 and i7 core processors have a feature called "Intel Turbo Mode Technology". This feature will automatically turn off unused cores when we open a single application thread, the processor will overclock the flow of data threads that run on it so that faster processing, while if the processing application is not a single thread, these cores will live again.

Intel Core i7 

Aimed at high levels. Core i7 is the first processor with technology "Nehalem". Nehalem uses a new platform that really different from previous generations. One is to integrate directly on the processor chipset, not the motherboard. Nehalem also replace the function of the FSB became QPI (Quick Path Interconnect) which is more revolutionary.




Intel Core i5 


Intended for mid-level. If Bloomfield is the codename for Core i7, the Lynnfield is the codename for I5. I5 is the value of the Core i7 series that will run on Intel's new socket is LGA-1156 socket. The advantage of this is embedded I5 Northbridge chipset functions at the core processor. So the motherboard Core i5 that will use Intel's P55 chipset should look vacant without the presence of northbridge chipsets. If you use a Core i7 Triple Channel DDR 3, then the Core i5 uses only Dual Channel DDR 3. The use of power is also reduced to 95 Watts. Intel also launched a Clarksfield, Core i5 mobile version is intended for notebooks. Socket to be used is mPGA-989 and the power required is quite small in the amount of 45-55 Watts.

Intel Core I3 


 Aimed at entry level. Intel Core I3 is a variant of the value compared to two other brother. This processor will integrate the GPU (Graphics Processing Unit) aka Graphics On-board inside the processor. Graphics capabilities with Intel GMA claimed on G45 chipset. In addition, i3 will use hybrid manufacturing, the core processor with 32nm, while the memory controller / graphics using 45nm. I3 product code is "Arrandale".

Nokia Starts Work on First Windows Phone

It seems that Nokia did not want to linger in preparing for the Windows mobile Phone 7 (WP7) them. The CEO Stephen Elop was explained, the current Nokia handsets start working on their first Windows phone. As quoted on Saturday (03/19/2011), Elop told Reuters regarding the commencement of the project are Nokia with Microsoft. "We are currently working on Windows Phone first handset from Nokia," he said. This news is not too surprising. The reason Nokia did mamatok WP7 target that the phone they already circulating in the market next year. The agreement between Nokia and Microsoft are lasted five years. On the one hand Micosoft really looking for hardware that is quite capable partner, while Nokia is maintaining its market which has declined, undermined Android, BlackBerry and iPhone.

gaming CPU chart (update des 2010)

Akhir dari Peradaban


Gempa dahsyat yang mengguncang Jepang beberapa hari yang lalu dengan kekuatam 9 SR dan menimbulkan tsunami mengguncangkan dunia. Bahkan, gempa tersebut merupakan gempa terbesar abad ini mengalahkan gempa Aceh yang menewaskan 100.000 orang. Gempatersebut selain meruntuhkan bangunan-bangunan di negera Akihito tersebut juga merusak system pendingin nuklir di Fukushima dan Daichi. Sampai saat ini, pemerintah jepang sedang sibuk mencari cara untuk mendinginkan reactor nuklir tersebut. Radiasi yang ditimbulkan, membuat Naoto Kan, memberlakukan darurat nuklir di Jepang. Radiasi yang mengancam penduduk sekitar sangat membahayakan kelangsungan penduduk sekitar.

Masih ingat dalam ingatan kita ketika bulan April 1986, reactor nuklir di Chernobyl, beberapa kilometer dari ibukota Ukraina, Kiev meledak sampai 1400 meter ke udara, sedangkan dampak radiasi yang ditimbulkan sangat masif, sekitar 300 km dampak radiasi masih dapat dirasakan. Ledakan nuklir Chernobyl di kiev bahkan memiliki daya ledak 200 kali Bom Atom Nagasaki Hiroshima tahun 1945. Sampai saat ini, tidak ada tumbuhan bahkan hewan renik yang hidup didaerah tersebut. Kalaupun ada yang hidup, bentuk fisiknya mengalami mutasin genetic. Korban radiasi nuklir tersebut ada yang mengalami kanker sekitar setahun kemudian. Anak-anak yang dilahirkan mengalami teratogenik sehingga lahir cacat.

Tragedy yang sungguh mengerikan dan mengancam sejarah peradaban umat manusia di bumi. Bisa dibayangkan jika nuklir tsersebut meledak, bukan tidak mungkin efeknya bisa dirasakan hingga jarak ribuan kilometer. Hancurnya peradaban dan mutasi genetic yang terjadi dapat menyebabkan perubahan struktur manusia. Mungkin ini yang dikatakan dalam teori sejarah, bahwa sejarah dapat terulang seperti sebuah spiral yang alurnya memiliki kesamaan namun susunannya berbeda.

Sejarah umat manusia yang diawali dari ketiadaan hingga mencapai ada merupakan contoh riil dari proses dekonstruksi peradaban manusia. Jika kita lihat bahwasanya meteor raksasa pernah menghantam bumi dan menghancurkan isi bumi hingga membunuh peradaban dinosaurus. Hal yang sama yang terjadi pada saat ini, ketika teknologi semakin canggih dengan nuklir sebagai media propaganda. Atas nama peradaban, efek patologis ini mengancam nyawa umat manusia. Sepertinya, apa yang dicita-citakan Francois Bacon dengan Knowledge to Power, impian membangun Negara dengan teknologi canggih mendekati kenyataan. Namun yang menjadi tumbal adalah kemanusiaan. Sepertinya inilah tanda-tanda akhir dari peradaban..
Wallahualam..

Tips for Treating Notbook With correct

I often hear many people who wonder about the use and maintenance of a laptop or notbook good and right. Well On this occasion I will share it with friends about how to treat a laptop or notebook with good.



1. namely on the LCD screen, LCD screen is dirty with stains and stamped hands is not comfortable viewing. A clean notebook screen will make you more comfortable on the move by using the notebook. The trick is simple wipe with a soft cloth, so as not membaret on the surface of the LCD.






2. Next On the keyboards usually are often found in dust. For this section, simply use a small brush and soft. Do not use a vacuum cleaner high pressure because it can make your keyboard keys are dismantled, or to minimize the entry of dust into the sidelines of the keyboard, install keyboar surge protector, which is now very much available in the market and the price is quite affordable.



3. About how to bring notbook correct, do not bring notbook on standby because it can affect your hard disk notbook Bring a notebook on standby will damage your hard disk. This is because the disc is still spinning hard disk, hard disk is not in the eye safe position and is still above the disc. This position will make the disk hard disk beret and can result in damage and lost data.



4. How to deduct batrai notbook correctly, before you start you should deduct notbook first heats the charger before the plug on notbook, ie by first silencing 3-5 marry after you plug it into electricity is done so that power is more stable and batrai charge notbook you can tercharge with more perfect. 





hopefully can be useful and good luck ....