Tuesday, September 25, 2012

Smart Outscores Globe Telecom in NTC Quality Test, 4-1


Smart Outscores Globe Telecom in NTC Quality Test, 4-1. The National Telecommunications Commission (NTC) confirmed the network superiority of Smart Communications, Inc. (Smart) following the release of the results of its network quality tests for the second quarter of this year which showed Smart posting significantly better test results than Globe Telecom.

Globe, however, issued a statement that attempted to turn the results of the NTC’S Quality of Service Benchmarking Test upside down.

According to that test, Smart’s network rated higher in four of the five parameters that had been defined by the NTC in consultation with all three mobile phone operators. These four important parameters where Smart posted better scores are:

1) Drop Call Rate
2) Call Set Up Time
3) Average Signal Quality
4) Average Receive Signal Level

In its statement, however, Globe conveniently downplayed or disregarded these parameters and focused on the “blocked call” parameter, which was the only test that showed better results for Globe. On that basis, Globe said that its “legacy network” was better than that of Smart.

This is the same legacy network that Globe officials have admitted, in several recent occasions, to be congested.

This selective reading of the test results defies arithmetic, and, more importantly, flies in the face of consumer experience.

Globe’s press statement also contains a substantive misinterpretation of the test results in one of the key parameters – the Average Receive Signal Level. Globe said in its statement that: “The final metric is the Average Receive Signal Level with a minimum acceptable range of -85 dBm. Both telcos did not make it to the standard.”

The truth, however, is quite different: Both carriers actually passed the standard. Globe registered a score of -69.83 dBm. But Smart delivered lopsidedly better results: -62.63 dBm. In this parameter, the lower the negative number is, the better the signal. Translated into layman’s terms, what this result means is that Smart’s signal level is up to five times stronger than Globe’s. In terms of customer experience, a stronger signal level means better indoor coverage, resulting in better voice quality, less drop calls, faster and more reliable SMS and higher data speeds.

Though we are encouraged by the NTC test which validates our network superiority, Smart continues to work hard in order to provide our customers superior service. By completing our network transformation in mid-2012, we are now moving on to deliver to our subscribers next generation services such as the Long Term Evolution, or LTE. This is vital because we realize that, in the end, it is the satisfaction and judgment of our customers that really matter.

Wednesday, July 25, 2012

iPhone 5 Images, Features, Release Date and Specs Leak

iPhone 5 Images, Release Date and Specs Leak. Leaked images of the iPhone 5 are probably number one on the web's most wanted list right now. It's been nearly a year since Apple last launched a smartphone, and over 25 months since the Californian tech giant launched a new design for its hugely popular iPhone. For all the up-to-date details on the illustrious device read our iPhone 5 release date, specs and rumour round-up.

Watch iPhone 5 Video, Features, Specs and Price & Release Date


So it's no surprise that people all over the world are a little bit excited to see what the world's most successful smartphone will look like next.

One of the most convincing iPhone 5 image leaks was picked up by 9to5Mac. 9to5Mac report that they were sent the images of the back of the iPhone 5.

9to5Mac are suggesting that the iPhone 5 leaked images seem to show a slightly bigger iPhone design. This estimate would back up previous rumours that the next generation Apple smartphone will boast a 3.99-inch screen with a resolution of 1136 x 640.

The Apple news site also later received images of what the website believe the front of the iPhone 5 will look like. The design at large doesn't look a million miles away from the current iPhone 4/4S design, however there are two majors changes. First is that the iPhone 5's camera appears to have been moved to a more central location. The consensus of opinion based on these images is that the iPhone 5 will achieve the rumoured 3.99-inch screen by slightly elongating the height of the screen, while keeping the width the same size as previous generations of the iPhone.

Secondly the leaked images appear to back up a previous iPhone 5 spec rumour that it will have a smaller connector/charging port [see right]. Visit iPhone 5 will get mini dock connector. A rumour which TechCrunch initially reported on while featuring its own leaked iPhone 5 image. TechCrunch claim that the new mini connector will downsize from the current 30-pin port to a 19-pin port. The technology website suggested that Apple was reducing the size of the iPhone 5 connector to provide space for extra spec.

Apple will be keen to get the design of the iPhone 5 spot on, as the previous few months has seen Android gain considerable ground on the iPhone in the Smartphone arms race. Notable the Samsung Galaxy S3 has caught the imagination of the public, with its similar specs and notably bigger screen. Latest figures suggest that the Samsung Galaxy S3 sales have hit the 10 million mark already.

Wednesday, July 4, 2012

What is an expansion card?

An expansion card is an electronic board or card added into the expansion slot of a desktop computer.

A computer usually comes with one or more expansion cards.

Types of Expansion Card

A Video Card generated the images displayed on the monitor.

A Sound Card is a device in your computer let’s play and record high-quality sound.

A Modem Card allows computer exchange information through telephone lines.

A LAN Card or usually called the Network Interface card lets connected computer share information and equipment.

A TV Tuner Card is a computer component that allows television signals to be received by a computer. Most TV tuners also function as video capture cards, allowing them to record television programs onto a hard disk.

Wednesday, June 27, 2012

Watch Samsung Galazy S III Features

Samsung Galaxy S3 features in TV Commercial




Samsung Galaxy S3 features
The Samsung Galaxy S3 features innovative new technology to see if you're looking at it and keep the screen on if you are.

Here's a brief look at the year's most hotly anticipated phone.


Galaxy S 3 available in two colors:


Marble White and Marble Blue














Tuesday, June 19, 2012

Types Computer According to Design


1. Supercomputer – computer which performs special functions, fast and powerful computer, outperforming most mainframes, and used for intensive calculation, scientific simulations, animated graphics and other work that requires sophisticated and high-powered computing.

2. Mainframe – large computer and expensive powerful computer that can handle thousands of connected users simultaneously and process up to millions of instructions per seconds.
3. Minicomputer – medium-sized computer usually used as a terminals
4. Microcomputer - personal or desktop computer is designed in such a way that the system unit, input devices, output devices and all other devices fit conveniently on or under a desk or table.
5. Laptop – handy computer; also known as computer notebook. It is small, lightweight computer that you can easily transport from one place to another.
6. Palmtop it can fit the size of a breast pocket, refers to a hand-held computer the popular type is a Personal Digital Assistant (PDA).



Monday, June 18, 2012

New Trends in Computer Technology


New Trends in Computer Technology

What is the RDIMM standard? Well, once upon a time, there was a memory standard that Intel was dying to promote as it was optimized for its own line of Pentium 4 processors. Unfortunately for Intel and most fortunate for the rest of us, the DDR memory standard made a much bigger splash and managed 
So the RDIMM memory standard died quietly, as even Intel realized that it was overpriced and with a very slight performance improvement. Now it seems that the RDIMM technology is trying for a second time to gain some market in the form of microbuffers, a concept that will be used by both AMD and Intel.


Until now, Intel said nothing about its plans concerning the microbuffer concept, while its rival, AMD was willing to share some general purpose information. The AMD approach seems to be quite a bright idea, one that could simplify the desktop or server memory make-up. One microbuffer discrete chip will be mounted between every two DIMM slots, practically driving them. This solution should allow each RAM channel to support twice the number of DIMMs in use now, allowing DDR3 to be a convenient server memory standard. This approach to use a single RDIMM chip for every two DIMM slots is sometimes called "Buffer on Board" or BoB for short.

According to most hardware gossipers around, Intel is working on a similar design too and it even showed a prototype about a year ago. Because of some differences between the designs employed by the two chip makers, it is possible to be talking about separate technologies using the same type of memory and having the same general goals. Just like always, when we are talking about Intel and AMD, AMD claims that Intel is copying them, while Intel is saying that they invented it first.

All things considered, there will probably be a small memory buffer integrated into the mainboard and not into the DIMM module itself. The advantage would be an increased maximum memory capacity for a given motherboard, with the only downside being the slightly more expensive motherboards because of the added circuitry.



Top 10 Computer Viruses


A round-up to the 10 worst computer viruses of all time.


Malicious software, worms, Trojans and computer viruses are on the increase, say security experts, as hackers, spammers and identity thieves seek new ways to steal information that can be used to empty bank accounts or spread electronic mayhem. Here, we present a look back at the 10 worst computer viruses of ever made:
1. The Morris worm
In 1998 Robert Morris, a university student, unleashed a worm which affected 10 per cent of all the computers connected to the internet (at the time the net was estimated to consist of 60,000 computers), slowing them down to a halt. Morris is now an associate professor at MIT.
2. The Concept virus
The Concept virus, accidentally shipped on a CD-ROM supplied by Microsoft in 1995, was the first virus to infect Microsoft Word documents. Within days it became the most widespread virus the world had ever seen, taking advantage of the fact that computer users shared documents via email.
3. CIH
The Chernobyl virus (also known as CIH) triggers on April 26 each year, the anniversary of the Chernobyl nuclear disaster. It overwrites a chip inside PCs effectively paralysing the entire computer. Its author, Chen Ing Hau, was caught by the authorities in Taiwan.
4. The Anna Kournikova worm
The Anna Kournikova worm posed as a picture of the tennis player, but was in fact a virus written by Jan de Wit, an obsessed admirer from the Netherlands. He ended up receiving a community service sentence.
5. ILOVEYOU
The Love Bug flooded internet users with ILOVEYOU messages in May 2000, forwarding itself to everybody in the user's address book. It was designed to steal internet access passwords for its Filipino creator.
6. The Melissa virus
The Melissa virus, written by David L Smith in homage to a Florida stripper, was the first successful email-aware virus and inserted a quote from The Simpsons in to Word documents. Smith was later sentenced to jail for causing over $80 million worth of damage.
7. The Blaster Worm
The Blaster worm launched a denial of service attack against Microsoft's website in 2003, and infected millions of computers around the world by exploiting a security hole in Microsoft's software. Its author has never been found.
8. Netsky and Sasser
Sven Jaschan, a German teenager, was found guilty of writing the Netsky and Sasser worms. Jaschan was found to be responsible for 70 per cent of all the malware seen spreading over the internet at the time, but escaped prison and was eventually hired by a security company as an "ethical hacker".
9. OSX/RSPlug Trojan
In November 2007, the first example of financially-motivated malware for Apple Macs was discovered in the wild. The launch of the OSX/RSPlug Trojan increased fears that Apple's platform may be targeted more by hackers in the future.
10. Storm worm
The Storm worm, originally posing as breaking news of bad weather hitting Europe, infected computers around the world in 2007. Millions of infected PCs were taken over by hackers and used to spread spam and steal identities.
Information courtesy of Sophos