CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Monday, January 28, 2008

Hebrew 13:5
Stay away from the love of money; be satisfied with what you have. For God has said, "I will never fail you. I will never forsake you."

Comment: Its true that money can do anything, so that, most of the people now do everything /anything to have money. People dont know how important to know about spiritual.
For me, spiritual need is very important because as GOD said He never leave you..

FOC Definition

Optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed. Optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed.
Fiber Optic Applications:
Interconnects: Standard and custom cabling solutions for your application.
Networking: Trunk cables, distribution cables, high-density interconnect cables, and standard patch cords.
Gigabit Ethernet: Fiber optic gigabit and multi-gig ethernet solutions in a multitude of styles, sizes, lengths, and special features.
Harsh Environment: Designed to provide performance and durability in the most demanding environments.
Military: Requiring rigorous testing and harsh environment certification to ensure reliability and performance in the field.
Aerospace/Avionics: Provide maximum performance and durability in harsh conditions and demanding environments.
Data Transfer Tests: Designed and manufactured to ensure quality and performance for all your testing applications.
Unmanned Vehicles: Support mission-critical ground to UAV communication and data collection applications

Image of FOC Cable


Friday, January 25, 2008

THE 7 LAYERS OF THE OSI MODEL

Layer 7: Application Layer

· Defines interface-to-user processes for communication and data transfer in network
· Provides standardized services such as virtual terminal, file and job transfer and operations


Layer 6: Presentation Layer


· Masks the differences of data formats between dissimilar systems
· Specifies architecture-independent data transfer format
· Encodes and decodes data; encrypts and decrypts data; compresses and decompresses data


Layer 5: Session Layer

· Manages user sessions and dialogues
· Controls establishment and termination of logic links between users
· Reports upper layer errors


Layer 4: Transport Layer

· Manages end-to-end message delivery in network
· Provides reliable and sequential packet delivery through error recovery and flow control mechanisms
· Provides connectionless oriented packet delivery


Layer 3: Network Layer

· Determines how data are transferred between network devices
· Routes packets according to unique network device addresses
· Provides flow and congestion control to prevent network resource depletion


Layer 2: Data Link Layer

· Defines procedures for operating the communication links
· Frames packets
· Detects and corrects packets transmit errors


Layer 1: Physical Layer

· Defines physical means of sending data over network devices
· Interfaces between network medium and devicesDefines optical, electrical and mechanical characteristics

Friday, January 18, 2008

5. Case Study(Purchase evaluation equipment or software)

5. Purchase equipment or some hardware and software needed in a certain company are good, but we have also to consider that every investment should be use in the company not on our personal interest, because there are some employees especially in high rank, they made a decision for there own good or satisfaction on there self. And People are liable to be attracted to risk. They buy international stocks. And they buy tech stocks - the riskiest of all (and about three times as risky as stocks in general). I don't know if people haven't seen a table like this before, or if they just don't want good-but-boring investments like timber or decent corporate bonds, for example. But when you take the time to compare the risk-reward ratios of different investments - in much the same way you would compare features of new luxury cars before purchasing - you give yourself a much clearer understanding of what to expect for your money. As we proved here, it's easy to find out just how much return you can expect…and just how many sleepless nights you'll have along the way. One more important thing to note: we only used 18 years worth of data in this chart, and that's probably not enough. If you just invested based on this table, you'd buy big U.S. stocks right now and shun small stocks, which could be a dangerous move. The table and the comparisons are only as good as the data used. And he investment decision (also known as capital budgeting) is one of the fundamental decisions of business management: managers determine the assets that the business enterprise obtains. These assets may be physical (such as buildings or machinery), intangible (such as patents, software, goodwill), or financial (see below). The manager must assess whether the net present value of the investment to the enterprise is positive; the net present value is calculated using the enterprise's marginal cost of capital.

A business might invest with the goal of making profit. These are marketable securities or passive investment. It might also invest with the goal of controlling or influencing the operation of the second company, the invested. These are called inter corporate, long-term and strategic investments. Therefore, a company can have none, some or total control over the investor’s strategic, operating, investing and financing decisions. One can control a company by owning over 50% ownership, or have the ability to elect a majority of the Board of Directors. What Reward to Risk Ratio is Right for you? “The key message here is that, when you evaluate any investment, you've got to consider both expected RETURN and RISK. Most people, dreaming about big potential returns, forget about the second variable - RISK. Don't include yourself in that list. Before making an investment, ask yourself: "How much risk am I really taking, and what is my upside?" For me, personally, I like to have a three-to-one reward-to-risk ratio. If I can't potentially make three times whatever I have at risk in a stock, it's not worth it.

4. Case Study(Purchase support agreements for less important titles )

4. As I had research in the internet a little while ago, there are 10 good ways to use remaining budget:

1. Pay for obsolete equipment recycling

Many companies find antiquated and stocked computer and electronic equipment on their shelves when they are in the process of moving. The easiest thing for a company to do would be to trash the equipment. Trashing computers and electronic equipment (telephones, cell phones, calculators, telephone systems, scanners, printers, and even typewriters) adds tons of toxic compounds to the nation's landfills, compromising air and land quality. In addition, computers or other electronic equipment dumped in a landfill can be easily traced back to the company that dumped them. That company will face huge environmental fines, among other issues. Many obsolete computers have been thrown in landfills, or were sent to gather dust in storerooms, basements, or attics. Some people who are currently stockpiling old machines are reluctant to part with them because they believe the equipment may still be valuable. This is rarely the case; however stored computer equipment becomes less valuable by the year. Instead of hanging on to your old Commodore 64, imagining that one day it may achieve its former glory, it's time to donate your equipment to a worthy recipient or simply recycling it. All modern UPSes have a low-battery alarm and run a periodic self-test; they will alert you when replacement is needed. Usually they both flash an indicator and make an alarm sound. If you have a monitoring daemon set up, they will alert it and you will probably get warning mail. If you ignore the alarm it will time out, but be repeated at intervals. Unfortunately, deleting data from obsolete equipment is a lifecycle management task that is often performed incompletely, if at all. Simply dumping files in the recycle bin, for example, does not really erase the information—it merely erases pointers to the information, putting the files themselves into an electronic limbo where they can be easily retrieved by skilled computer criminals

2. Replace UPS batteries or entire units

Make sure the UPS keeps in contact with its electrical ground at all times. Don't overload it. If it shows signs of misbehavior or malfunction, yank it until it's repaired, or replace it. Your UPS has a battery inside it. Usually it is a lead-acid type (those are the least expensive for the manufacturer), but both lithium and gel-cel batteries are sometimes used. The battery is by far the most vulnerable and failure-prone part of your UPS. If you have your UPS long enough, you will probably have battery problems. Once every six months to a year or so you should recalibrate your UPS's battery sensor, and once every several years you will have to replace the batteries. All modern UPSes have a low-battery alarm and run a periodic self-test; they will alert you when replacement is needed. Usually they both flash an indicator and make an alarm sound. If you have a monitoring daemon set up, they will alert it and you will probably get warning mail. If you ignore the alarm it will time out, but be repeated at intervals. You will occasionally get a false alarm. It's a good idea, if you get an alarm, to explicitly trigger a UPS self-test the next day and see if the alarm goes away (the procedure for doing this varies depending on your UPS software). If the alarm is persistent, you need to replace the batteries. It has been reported that bad batteries can also produce symptoms that mimic inverter failures or wonky control electronics. Even if your UPS is displaying epileptic symptoms like repeating alarms and flashing panel lights, a bad battery is the first thing to suspect. It's best to wait until the low battery alarm before ordering a replacement; keeping batteries on the shelf reduces their life unless you keep them fully charged. Do not throw old batteries in your regular trash! They contain toxic metals and acids. Be kind to your environment and hand them to a qualified party for recycling. Most battery dealers will cheerfully do this for you. If not, your local garbage company or waste-disposal authority can explain to you how and where to turn them in safely.

3. Purchase power management

Today you have a lot of options for buying computers and other name-brand products for your home. Why shop with Purchasing Power? You can qualify for Purchasing Power based on your job, not your credit score. So you and your family can get the computer and home entertainment products you want, even if you have had difficulty with credit in the past. For everything you buy from Purchasing Power, your payments are consolidated into one amount that is deducted from your paycheck. No extra check to write, no additional bill to keep up with. When paying cash you may find lower prices, but the interest rates on credit cards and in-store financing plans can make your actual cost much higher than the cash price. We show you exactly what you will pay over a 12-month period. And there are no financing charges ever. Purchase Power enables you to get a bill for postage and other office related expenses. You'll never have to worry about prepaying for postage again. Simply order the postage, supplies and other items you need, get billed and earn rewards. Purchase Power provides customers great benefits for all postage and office-related expenses: Convenience, one account for all your postage and office related expenses. Peace of Mind, never run out of postage again with instant access to postage whenever it is needed. Funds Management, no idle prepaid funds and no last minute checks for postage and other purchases; pay once a month, after you get the bill. Accounting Control,track and pay for all postage and mailing related business expenses on one, monthly consolidated and itemized bill. Payment Flexibility, multiple payment options that meet the business needs of the customer. Rewards earn free postage, supplies, or other great merchandise simply by using Purchase Power and being a Pitney Bowes customer Visa Privileges - Purchase Power comes with Visa privileges which means you can use your account for purchase outside of Pitney Bowes, such as shipping, technology and supplies from retailers like Stapes and Office Depot. For all purchases using the Visa card, you'll earn double point towards rewards.

4.) Purchase support agreements for less important titles

If you are making a new product purchase you will be offered available support agreement options for each of the products you select at the time of purchase. To purchase a new Support Agreement for your supported version of MDaemon (SecurityPlus is covered with a MDaemon Support Agreement), Outlook Connector, or RelayFax view pricing information below or go directly to the Support Agreement purchase page and enter your product registration key to buy now. Because of direct customer requests for a support model that will allow IT managers and business owners to better manage IT operating expenses, support agreements are being added as an additional option to the per incident phone and free email technical support models. Current upgrade protection is not required to purchase a support agreement, but you must be using a supported version of the product If you upgrade your product during the term of your support agreement you will not be required to purchase a new agreement until the end of your existing term. No title to or ownership of the Software or any proprietary rights related to the Software is transferred to Licensee by these Terms. Licensee agrees not to use the Software for any purpose or in any manner other than authorized by these Terms; host the Software for a fee for any third-party without explicit permission from DiMeMa; distribute, lend, license, rent, or otherwise transfer the Software; reverse engineer, disassemble, or decompile the Software or otherwise attempt to discover or recreate the source code to the Software; make any modification, adaptation, improvement, enhancement, translation, or derivative work of or to the Software; remove, alter, or obscure any proprietary notices (including copyright notices) of DiMeMa or its licensors contained in the Software; use the Software for purposes for which it is not designed; and exceed the maximum number of Items in its Collections for which it has paid the applicable license fee. Licensee shall comply with all applicable laws, rules, regulations, orders, and other requirements, including U.S. export control laws, in its use of the Software.

5. Purchase evaluation equipment or software

Computer equipment and software purchases having a purchase price greater than $25,000 will be reviewed for technical and financial complications and to satisfy State reporting requirements. This policy is in effect for planned acquisitions of computer equipment, networking equipment and software (hereafter referred to as equipment) for any purpose having a purchase price greater than $25,000. The total value of the acquisition shall be the controlling consideration, whether by purchase, rental, or gift. All sources of funds (state, institutional, trust, etc.) are covered by this policy. Donated equipment with a commercial value of $25,000 or more shall also be covered by this policy and will be reviewed, primarily for any technical or financial complications and to satisfy State reporting requirements. The objectives of this policy are: to review the adequacy of the proposed system as a solution for the data processing problems considered, to evaluate the impact of the acquisition on University facilities, including space, utilities, and air conditioning, to evaluate the impact of the acquisition on campus computer systems, both existing systems and future systems development, to determine that cost effective alternatives, if any, have been considered, to identify probable growth of expenditures and assure that financial requirements related to the acquisition are understood, to satisfy State reporting and approval requirement. The departmental representative may contact the Computer Center at Central Stores for equipment which is not to be purchased through the Purchasing Division. Upon receipt of pricing information, a Stores Requisition form with a list of the equipment is to be forwarded by the departmental representative to the Computer Center. At the same time, a statement of application utilizing the format indicated on the attachment to this policy statement is to be sent to the appropriate reviewing office indicated in B1, B2, and B3 above. These offices will notify the Computer Center when approval is granted. For donated equipment, notification will be forwarded to the departmental representative. When notice of final approval is received, the Manager of the Computer Center will release the equipment for delivery to the department.

6. Get a few rolls of Velcro

Velcro straps have a small slit at one end that allows you to wrap the strip tight and attach it permanently to the wire. Next, all you have to do is wrap the strap around all of the wires that you want to bundle together. Another is cable ties from Belkin provide a quick and convenient way to organize your audio video cables, computer cables, and more. These high-quality Ties are easy to use and reuse with their self-attaching design. Multiple colors (red, green, black, yellow, blue, and gray) let you color-code your connections for easy identification. Now you can rest assured that your cables are secured safely, and when you need to disconnect a cable, you’ll be able to find it fast. This odd little concept is a new way for securing a hard disk in a computer.Today, while listening to Google scientist Craig Neville-Manning speak, I learned the secret of Google's success... velcro. It turns out that one of Google's core principles is to do things quickly and cheaply. They use tons of commodity PCs, knowing that many of them will fail. But they make up for the failure in software. They practice "reliability through replication," as every PC is duplicated somewhere so that if it fails, the software simply switches to the new one. Once a week someone comes through with a cart and replaces all the hard drives, power supplies, or whatever it may be. To save time, there are no screws. Components are attached with velcro. Unstrap a hard drive, and strap a new one in. Now you know the secret to Google's success. Colorful velcro holds pads sucurely centered under the harness straps. Improved comfort and virtually eliminating distracting harness adjustments are major advantages gained by the simple yet effective use of velcro. Mirror riveted to velcro strap for easy veiw of fuel level. Rolls up to tuck neatly under NAV/COM case. Instrament panel constructed of and mounted with velcro. Easily removed when useing the harness for free flight.

7. Purchase small stopgap upgrades

Memory is so important that it cannot be wasted. RAM is allocated by the operating system and programs, and then released when not needed. Errant applications can grip RAM and not release it, which results in a diminishing amount of memory available as you load and use more programs. One of the easiest ways to boost performance for any PC is to add memory to the system. But before you go to get that memory upgrade, be sure to gather information about your computer to ensure you get the right memory for your system. You need to know what type of memory the computer uses, the memory module sizes and what already exists in the system. Adding Random Access Memory (RAM) is an easy and cost effective way to boost your computer’s performance. Although the computer may function with 512MB of RAM or even less, generally 1024MB is a reasonable minimum. Computer consultants build entire careers around advising businesses when to upgrade their hardware. Should you go with the latest and greatest, or stick with tried and true? As with all business decisions, it comes down to a question of cost vs. benefit. But quantifying the costs and benefits of hardware can be difficult. Here are some factors to consider when you are agonizing over whether to upgrade. The price tag of your new system isn't the only cost ? there is also the time, energy, and money to migrate your information to your new equipment. If you're thinking of upgrading just so you can have the latest gear loaded with all the bells and whistles, stop. Unless you have a solid business case for upgrading, your money will be better spent elsewhere. Stopgap measures. If it's bells and whistles you want, maybe you can add them yourself. Adding additional RAM ? or Random Access Memory, which is the memory that allows your computer to perform its tasks ? is a great way to speed up your system, and it's really simple, even for neophytes. Most RAM retailers, such as Crucial and TigerDirect, have online configuration calculators to tell you exactly which RAM your system needs. Once you get the right RAM, it's simply a case of opening your computer case and snapping it in place.

8. Book training for the next year

Conservation Training and Development facilitates training in conservation and preservation, demonstrating the commitment Collection Care has to quality training in these areas. By assessing training needs and developing training strategies, Conservation Training and Development contributes to the broad range of activities involved in caring for collections.]In response to the need to develop book conservation training and to increase the numbers of students studying book conservation, the British Library is working with Camberwell College of Arts, one of the colleges that make up the University of Arts London, on a two-year Foundation degree. Skills development within Collection Care is being achieved by: Identifying the current and future skill requirements for Conservation and Preservation staff through conducting Skills Audits, Ensuring that appropriate learning and development opportunities are available to meet the needs of the British Library, Bringing about effective change through training plans based on the skills requirements of staff and the material in the collections, Evaluating and reviewing training programs in response to identified needs, These work placements run for a minimum of four weeks and a maximum of 12 weeks, although longer placements may be considered. The work that individuals undertake will be determined by the conservation programmed at the time of their work placement. Individuals applying for placements will be expected to have a good knowledge of conservation methods and materials, and good practical skills.If you have a computer and online access, you can explore the thousands of job postings that are placed only on the Net, or find the best price for a consumer good. Even more importantly, training in high-tech skills will prepare our youth for employment in the 21st century. Today, a significantly high percentage of jobs require computer literacy. More than seven million Americans now work in information technology jobs. More Americans now build computers than cars, make semiconductors than construction machinery, and work in data processing than petroleum refining.

9. Buy core spare parts

PC users are running multiple, intense software applications simultaneously, increasing demand on hardware resources. In the office, PC usage has changed from data entry and word processing to e- Commerce, online collaboration and an ever-increasing need for continual security and virus protection. In the home, interests have shifted from low-bandwidth photos and Internet surfing to downloading and viewing high definition videos, as well as advanced photo and video editing. Many a times, people who go to buy spare parts commit one grievous mistake by settling for even lower quality gadgets. It is therefore important to note that for better performance of your tasks using the computer, proper investment in these accessories would to a larger extent relieve you of the stress of budgeting for a new computer just yet. One thing that should always be kept in mind when going for a computer part is the manufacturer. I The Intel Core 2 Duo processor was developed to meet all these demands. Built on the innovative Intel Core microarchitecture, the Intel Core 2 Duo desktop processor delivers revolutionary dual-core performance and breakthrough processor energy efficiency. With Intel Wide Dynamic Execution, Intel Smart Memory Access, Intel Advanced Smart Cache and Intel Digital Media Boost, this new processor is designed to do more in less time. Additional features to support enhanced security, virtualization, and 64-bit computing make the Intel Core 2 Duo the most impressive new processor developed for an increasingly multimedia-centered, high-definition world. Design changes in the Intel Core 2 Duo processors that improve performance also increase processor energy efficiency by operating at lower frequencies that require less power to run. Intel Intelligent Power Capability optimizes energy usage of the processor cores by turning on computing functions only when needed. This more energy-efficient processor supports smaller, more capable, and quieter desktop PC to conserve critical power resources.

10. Replace any data center CRTs with LCDs

Cathode ray tube (CRT) display and liquid crystal display (LCD) were compared for their suitability in visual tasks. For this purpose visual performance was assessed by means of a search task carried out using both displays with different levels of ambient light. In addition, suitability was rated subjectively by users of visual display units (VDUs). Error frequency for search tasks carried out using LCD were significantly smaller when compared to error frequency for tasks at CRT. LCD gave rise to 34% less errors than did CRT. Reaction time in search task was found to be significantly shorter using LCD when tasks were carried out in darkness. Subjective rated suitability of LCD was scored twice as high as suitability of CRT. Results indicate that LCD used in this experiment may give better viewing conditions in comparison to CRT display. CRT (cathode ray tube) uses a massive tube housed behind the screen to shoot light at the screen. It is much wider than an LCD (liquid crystal display) monitor which uses liquified crystaline which reacts to electrical signals passed across it to display colors. LCD projection has been around for a number of years and it is now accepted as the "standard" video projector rather than the older CRT technology. They are now capable of high brightness, high resolution and good contrast. Projectors are also capable of generating an image of almost any size, for front or rear projectors. LCD rear projecction comes in two main forms. One is the self contained video projector, in a cabinet and looks like a large, conventional TV. They tend to be lighter weight than a flat LCD or plasma display of a similar size although they are deeper than a typical plasma screen. The other form is a built in rear projection screen using a projecctor behind it. The great advantage is that the screen can be chosen to be any size required for the room but it does need to be built into a wall or other surround with space behind it.


Thursday, December 20, 2007

Patch Pannel front & back view


Front View


Back View