Lets face it more and more people are being given Notebooks at their place of work. You want to have access to files at the office and away. You may not have internet access and your VPN performance might not be what you would like.
You can certainly use Cloud based solutions and sync to the cloud – but security might be an issue with work related documents. Company policy might be to save all files on the network so they are backed up and keep nothing on your local drive on your notebook.
There are several different solutions you might want to look at when your trying to follow policy as well as being as productive as possible. You can use Microsoft Live Mesh to sync your network files or folders with your local drive on your notebook. Alternatively I saw a small application reviewed today called FOLDER Replica (Win2000 / XP / Vista / Win7). Take a look for yourself – read the review it might be handy to have.
Folder replica is a folder synchronization program that is designed to make your life easier in daily file manipulation routines. Advancement in HDD drive technology has made hard drives a cheap, fast and accessible backup option. The flexibility to copy and change data on to your backup device has brought new problems of how to avoid unnecessary data transfer every time you want to make a fresh copy of your data.
Full Review @ addictivetips
Yesterday was a great day for Amer and PowerCloud Systems.
A press release sent, plus an Article written about our Access Points & Cloud Management and details of the solution provided for a School District in Alabama. One of our first install of 100 access points is up and running and has gone very well – the customer is extremely happy with how easy the install went and the performance of the access points.
Wayne Caudle, Boaz City School District IT director: “We prepare students for success in the 21st century and that requires a digital-classroom environment with great Wi-Fi connectivity as its foundation. Our high school students bring laptops to class and many use smartphones and even tablets on campus. Robust connectivity is a must-have, and Amer Network delivers a Wi-Fi solution that can manage this increasing demand.” “Amer’s cloud-based solution exceeded our operational requirements from Day One. Students and staff effortlessly connected across campuses and between buildings. Teachers can immediately start expanding their lesson plans to make technology a more integral part to their classroom instruction. Features such as enhanced security and network monitoring enable us to provide an online environment that is safe, controlled and powerful.”
Amer Networks Installs Cloud-Managed WiFi for Alabama Schools – Article – MSPmentor
PRNewswire – United Business Media
I know this has been said before, but maybe this time it will be true. You have two heavy weights – Apple and Intel behind the technology and it just makes so much sense. Remove all your ports on your systems and just have ONE for everything….
Originally this was the goal of USB, but it has failed due to performance and it not really being developed for Video. Very interesting and Apple is the first to market with their new line of notebooks with the standard.
I can see this taking hold very quickly, quicker then what the article below indicates – it’s too bad that they missed the current INTEL processor change-up as this technology might have been included in that refresh of systems from other major players like HP – DELL and Lenovo. I think the next round of processor updates you will see both the Thunderbolt and USB on new systems and sometime next year USB will be removed from the picture completely.
GOOD BYE – USB
In its initial out-of-the-lab incarnation, Thunderbolt can use either copper or fiber connections for 10Gbps bidirectional communication. That speed is 20 times faster than the theoretical limit of USB 2.0, 12 times faster than FireWire 800, and twice as fast as USB3. According to Intel, however, the 10Gbps isn’t just a theoretical peak speed, but usable bandwidth. This allows a single port to communicate with multiple devices simultaneously for a combined throughput of 10Gbps.
That 10Gbps is much faster than most current I/O technologies. With two devices pushing data at the maximum rate, you could back up a full Blu-ray movie in 30 seconds, or sync 64GB of music to a portable device in about a minute. Copying the entire contents of the Library of Congress in digital form—approximately 20TB of data—would take about 35 minutes.
Active electrical-only cables can be up to 3 meters (just under 10 feet) in length, similar to current FireWire and USB standards. Active optical cables, which use fiber for data transmission and copper for up to 10W of power, can be “tens of meters” in length. Passive fiber-only cables could potentially be hundreds of meters long. These lengths enable more flexible positioning between devices and computers instead of relying on specialized connections or relatively pokey wireless solutions.
Thunderbolt Technology Brief (PDF) (intel.com)
To get even more technical information take a look at the following POST: ars technica
I have been saying this for years… No one can really keep up with technology, but companies are certainly trying to force the issue with the methods they produce product today. It’s truly sad that we have gone down this route, might be too late to turn around though.
Companies creating product that cannot be upgraded, batteries that cannot be replaced and the quality of the product just not standing up. This includes everything from little electronics to large appliances!
Found this great article today that I wanted to share, it positions the current situation perfectly using the products of today!
That shiny new Android phone you just bought? Yeah, it’s a piece of trash. No, I’m not some Google-hating Apple fanboy. The iPhone 4 is junk, too.
So is that giant, flat-screen 3D TV and tablet you bought in the past year. It’s trash. All trash.
Of course, everything ends up broken, obsolete and unusable at some point. The trouble is, the companies that make our consumer electronics are deliberately or carelessly decreasing the useful life of our gadgets so they can sell us another one sooner
As more and more people are moving away from the desktop and moving to portable systems, the more they are using batteries and cutting the power cord. In the past there where several rules when using Nickel type batteries due to the memory and I believe most people might still be holding on to that believe with newer technology. Full discharge, full charge!
New Notebooks, Netbooks and smartphones are coming with Lithium-ion batteries and they operate much differently from there older cousins. There is no memory and once the product is fully charged, the charging stops as long as everything else is working.
The reason for this post and my research on this subject was due to my 18 month old Notebook and a dead battery. Like most of us I didn’t follow any type of process or rules and either did the rest of the family. The system was used on battery power for short and long periods of time, but not all the time. Over the summer it might have been used more on battery power as everyone wanted to work outside.
Based on the document below my battery lasted the correct amount of time – most of the time it was fully charged, installed and plugged into the wall. The issue is the heat – Notebooks run really HOT, so the temperature of the fully charged battery was HIGH all the time. For the first 6 months to a year my family was using a pillow to rise the notebook when sitting in the living room. Talk about rising the temperature of the Notebook and everything in it. I put a stop to that and they started using a board, but still the unit was too hot and the battery died.
Today I have a very nice cooling pad with a fan and the difference in temperature is huge – What this really means is the entire unit will run better and will last longer. Hopefully not a lot of damage has already taken place!
The worst condition is keeping a fully charged battery at elevated temperatures, which is the case with running laptop batteries. If used on main power, the battery inside a laptop will only last for 12-18 months. I must hasten to explain that the pack does not die suddenly but begins with reduced run-times.
A lithium-ion battery provides 300-500 discharge/charge cycles. The battery prefers a partial rather than a full discharge. Frequent full discharges should be avoided when possible. Instead, charge the battery more often or use a larger battery. There is no concern of memory when applying unscheduled charges
If you really want to understand the technology and have sometime you can read the following as well.
Anyone in the service / support field who needs to move from building to building supporting your customers – this tool can make it so much easier getting the job done.
Simple program that creates multiboot USB/ISO from various ISO Files.
Lifehacker – Xboot Creates your own custom, Multi-image bootable USB Drive
I always like when technology is used and it gives a huge return in kids education. Yes it means changing the way your lesson plans are presented, yes it means being creative and a little more work in preparation – but doesn’t the end result justify the investment. It can even make your job of teaching more enjoyable and rewarding when you see more kids staying on track and engaged in the class. At the end of the day we want the kids to leave school each day with some understanding, some new insight and thinking about and growing in some manner.
I have heard and seen advertising for these clickers for sometime, but never really understood just how valuable these could be. I thought it was just another technology gimmick! How could these really be used to keep kids on track and gaining their full attention throughout a lesson. What a great article that ran today in New York Times, talking about how many Universities are utilizing this technology to do just that! About half-million students are using them today.
EVANSTON, Ill. — If any of the 70 undergraduates in Prof. Bill White’s “Organizational Behavior” course here at Northwestern University are late for class, or not paying attention, he will know without having to scan the lecture hall.
Many kids don’t really like these clickers, while others believe it helps them keep on track and do what they really should be doing in class.
Though some Northwestern students say they resent the potential Big Brother aspect of all this, Jasmine Morris, a senior majoring in industrial engineering, is not one of them.
“I actually kind of like it,” Ms. Morris said after a class last week. “It does make you read. It makes you pay attention. It reinforces what you’re supposed to be doing as a student.”
Take a read of the entire article to really get a good understanding – the key is to incorporate the clickers into your lesson plan and get the kids involved throughout the lesson. This approach I believe can be used for any grade as it puts technology in the hands of the child that is more than a little familiar in using it already.
NEW YORK TIMES – More Professors Give Out Hand-Held Devices to Monitor Students and Engage Them
Technology at it’s best!
I think of myself as an advanced user of software, I like using the tools available in any software to make my job as easily as possible. I also know there are many more people who use the software that is put in front of them and are only able to do basic stuff.
All users can take advantage of tips and tricks to become more productive. Nice little article about Outlook 2010 and searching.
Hi, I am Roby Kurian, Product Manager for Outlook. How often do you ask yourself, “Where’s that message?”
Whether you are a filer (you keep messages carefully organized in folders) or a piler (you keep all of your messages in your Inbox), these three tips can help you find that elusive message.
Personally, I am more of a piler — I have created folders and use Outlook rules to direct some messages automatically to those folders. But most of my work messages stay in my Inbox. Leave a comment below and let us know if you are a filer or piler.
Now let’s talk about the main topic of this blog — search. We made great improvements to search performance in Outlook 2010. Here are three scenarios and strategies to find the email you are searching for.
Since virtualization is key to most technologies going forward and a number of districts have already started down that road and I believe many more are looking at it.
I thought his article from Microsoft might be of assistance.
Todays post is from Dave Trupkin, Senior Product Manager for App-V and Med-V
I’m coming to you live from Tech·Ed Berlin. Karri Alexion-Tiernan just posted over on the Windows for Your Business a blog outlining Microsoft’s position on Desktop Virtualization describing the “layers” and the importance of management.
I had the opportunity to catch up with some experts on the show floor and get their insights regarding deploying Microsoft’s Desktop Virtualization and as a bonus, Citrix joined us to chat about XenDesktop integration with our virtualization technologies.
Let’s spend some time together to dive in to the different components of the Microsoft Desktop Virtualization stack and talk about deployment tips and resources to help you get started with each. In future posts, we’ll explore the specifics of each technology in greater detail.
If this article does not make you take the time to secure your Wireless network at home, then I don’t know what will. A huge amount of people have wireless networks and a large portion of these people have not turned on any security, some of turned off default settings like passwords because they don’t understand!
Take a read of the article and then go home and make sure your network is secure!
Chances are you don’t leave your front door unlocked. And you shouldn’t leave your Wi-Fi network unsecured either.
Many of you may have heard this before, but many still seem to not be doing anything about it. You should. Here’s why. With a $50 wireless antenna and the right software a criminal hacker located outside your building as far as a mile away can capture passwords, e-mail messages, and any other data being transmitted over your network, and even decrypt data that is supposedly protected