Category Archives: Computer

HGST IDK Travelstar 1 TB Internal hard drive Serial ATA-300 2.5″ 5400 rpm H2IK1000854SP

HGST_TRAVELSTAR_1V2HBBDN_0S03508_0548718982_11-2014
HGST_1TB_Notebook_HD_17262610_06-08-2015

Detailed Description

(Manufacturer # 0S03508 )

Travelstar® 1TB 2.5-inch High Performance Mobile Hard Drive

  • 2.5-inch Portable SATA Hard Drive
  • 5400 RPM – 1TB capacity
  • SATA III 6Gb/s performance
  • Advanced format, 512byte emulation (512e)
  • Rugged design for higher reliability and better performance
  • Eco friendly – halogen free and power efficient design
  • 3-Year limited warranty

travelstar

travelstar2

$64.99 In stock
March 2012 · HGST · Travelstar · Internal · 1 TB · SATA · 2.5 Inch Drive · 5400 rpm

With its halogen-free production and low power consumption, the Travelstar hard drive carries the Hitachi EcoTrac classification. Designed to support the high-performance needs of multi-tasking, mobile users with a life on the go, the Travelstar hard drive offers speed without sacrificing battery life, capacity or audio quality.

Warranty Information

Please write to Fry’s Main Office for warranty information on products purchased at Frys.com:

Fry’s Electronics
600 East Brokaw Road
San Jose, CA 95112

Thank you!

Most manufacturers will not honor warranties for items shipped overseas or to Canada.

If you do not receive an email from us within 24 hours of placing your order, please email a friendly Customer Service Associate at service@cs.frys.com.

Rebates

In most cases rebate forms are not in the boxes. If you ordered your product via the Frys.com website, the rebate form can be located by clicking the Track your Order link. Rebate forms are also available in our Rebate Form Center or from the product description page. If you are unable to download the rebate from the Frys.com website, please email Customer Service at service@cs.frys.com for assistance. Most rebates are only available in the United States and Canada unless otherwise specified.

About your manufacturer’s rebate …

If you are sending away for a manufacturer’s rebate, Frys.com recommends that you follow these steps:

STEP ONE … In order to assist you with your rebate needs, you should keep PHOTOCOPIES of the following items for follow-up purposes: (1) Original purchase receipt (2) Fully-completed rebate form (3) UPC from the product.

STEP TWO … Follow the instructions on the rebate form.

STEP THREE … If you do not receive your rebate within the stated time on the rebate form, please contact the manufacturer for assistance. The time period for rebate payments starts with the postmarked date.

STEP FOUR … Your satisfaction is important to us, please contact our customer service department if you experience any difficulties obtaining assistance from the manufacturer.

The Unbearable Lightness of Cyber

If the ‘Internet of Things’ were so great, why isn’t the First Thing that everything connects to a computer for HUMANS to control it all?

How Do You Do This to a Tablet or Laptop?

I am so delighted with the thermostat in my apartment. It doesn’t have batteries, buttons or a display. If I want heat or cooling, I simply slide 1 or at the most 2 switches, the only mechanism is a mercury switch, it does exactly what I want, I am THE MASTER.

At my old place, I was ready to go get one of these. I thought I could find one at a used equipment place. If I hadn’t moved here, I was ready to revolt. My only resort in my former helpless condition with a programmable thermostat was to let the batteries run out and use a portable heater in the bedroom.

I think the management at my new place resorted to this subversive strategy of great, obsolete stuff, because it was easier than having to deal with tenants who can’t program the d!&%*mned things.

Not my original idea, but a guy told me that every single, last, blasted device—even new toasters that won’t let you push the lever up when the toast is done sooner than the dial setting, but you have to push a RE-SET BUTTON to get the stuff out before it burns—everything that beeps, buzzes or blinks at you SHOULD HAVE A PORT THAT WILL CONNECT TO A COMPUTER     s.o.   y.o.u.    d.o.n.t.   h.a.v.e.   t.o.   p.r.o.g.r.a.m.   c.r.y.p.t.i.c.   d.e.v.i.c.e.s.

This is bliss in the age of «the internet of things». If this grand technological scheme which is haywired from the outset had any merit,     T.H.E.Y.   W.O.U.L.D.   H.A.V.E.   I.T.   A.L.L.   C.O.M.P.U.T.E.R   C.O.N.N.E.C.T.E.D.

EdwardSnowdenThis is living proof that technology is intrinsically fascist. The people who dream this stuff up are techno-Nazis. Edward Snowden may fantasize about being 007, but he’s really just monogonad Adolph Hitler in a super-hero costume. The people who live techno-junk day in & out are really in the service of MiniLuv, “the place where the lights never go out”.

Making every little Hitler-gadget accountable to a computer interface is something the designers never dreamed of, because they’re all really about controlling us, even as they beguile us with the latest whiz-bang neato things they’re going to do for us.

Tomorrow’s Junk Today.

Why Hoboken is Throwing Away All of its Student Laptops

I decided not to teach Adobe Illustrator to Bernie, because of the comments at the end of this article.

AlGoresComputerFetishI have been intensively involved with computers, sometimes for a reason. I have a lot to say.

I read all the posts—unlike most of the ephemeral attention the information tsunami receives. All your comments changed my  mind—I was planning on teaching my 7-year-old granddaughter to use Adobe Illustrator to channel her constant drawing. Now I realize the mistake I was making. I’ll keep her as far as possible away from computers.

TODDLERS BECOMING SO ADDICTED TO IPADS THEY REQUIRE THERAPY

http://www.telegraph.co.uk/technology/10008707/Toddlers-becoming-so-addicted-to-iPads-they-require-therapy.html

Children as young as four are becoming so addicted to smartphones and iPads that they require psychological treatment.

Are smartphones making our children mentally ill?

Leading child psychotherapist Julie Lynn Evans believes easy and constant access to the internet is harming youngsters

telegraph.co.uk/news/health/children/11486167/Are-smartphones-making-our-children-mentally-ill.html

INFANTS ‘UNABLE TO USE TOY BUILDING BLOCKS’ DUE TO IPAD ADDICTION

http://www.telegraph.co.uk/education/educationnews/10767878/Infants-unable-to-use-toy-building-blocks-due-to-iPad-addiction.html

The Association of Teachers and Lecturers warn that rising numbers of children are unable to perform simple tasks such as using building blocks because of overexposure to iPads.

SLEEP PROBLEMS PLAGUE DEVICE DEPENDENT CHILDREN

http://www.thefiscaltimes.com/Articles/2014/03/03/Sleep-Problems-Plague-Device-Dependent-Children

Cellphones and other devices emit the “blue light” that works against the sleep process by interfering with melatonin, the chemical in our bodies that promotes sleepiness.

Anecdote: When I was in the 10th grade in 1970, I shared a science-fiction short story I had read with my friends: Like the kids in Hunger Games, rural, disadvantaged kids lacking access to specialized calculating equipment were able to beat elite urban kids in math competition by using traditional paper-based cyphering techniques.

Life imitates art, as a recent news article shows: “FINNS BEAT U.S. WITH LOW-TECH TAKE ON SCHOOL”, Politico 5/27/14

http://tinyurl.com/lz8w69k .

“At the start of morning assembly in the state-of-the-art Viikki School in Helsinki, students’ smartphones disappear. In math class, the teacher shuts off the Smartboard and begins drafting perfect circles on a chalkboard. The students — some of the highest-achieving in the world — cut up graphing paper while solving equations using their clunky plastic calculators.” (Read More… http://tinyurl.com/lz8w69k )

I trace a lot of this confusion to the indubitable Al Gore, Nobel Peace Prize winner. As Vice-President, he had enormous influence promoting the idea that the mere possession of computers automatically confers educational excellence. (Image: Al Gore as a traditional medicine man dancing with a little computer rattle. http://postimg.org/image/moxpm6ykz/ )

I’m very happy at Kim from Far Rockaway’s comments, contradicting what I am saying here. I would love it if every teacher were sufficiently conscientious and skilled to be able to ensure her students’ excellence. But I suspect that Kim would succeed with her students under any circumstances.

Why Hoboken is Throwing Away All of its Student Laptops

wnyc.org/story/why-hoboken-throwing-away-all-its-student-laptops/

Tuesday, July 29, 2014

The Hechinger Report

By Jill Barshay : The Hechinger Report

Inside Hoboken’s combined junior-senior high school is a storage closet. Behind the locked door, some mothballed laptop computers are strewn among brown cardboard boxes. Others are stacked one atop another. Dozens more are stored on mobile computer carts, many of them on their last legs.

That’s all that remains from a failed experiment to assign every student a laptop at Hoboken Junior Senior High School. It began five years ago with an unexpected windfall of stimulus money from Washington, D.C., and good intentions to help the district’s students, the majority of whom are under or near the poverty line, keep up with their wealthier peers. But Hoboken faced problem after problem and is abandoning the laptops entirely this summer.

“We had the money to buy them, but maybe not the best implementation,” said Mark Toback, the current superintendent of Hoboken School District. “It became unsustainable.”

None of the school administrators who initiated Hoboken’s one-to-one laptop program still work there. Toback agreed to share Hoboken’s experiences so that other schools can learn from it. Continue reading

Webpage Coder’s “Senior Moment”

Dreamtime output outlined in red.

Bill Keevers took a little afternoon siesta while coding this file for City of Sacramento residents to report missed service for "solid waste" pickup. (Read "garbage").

Bill Keevers took a little afternoon siesta while coding this file for City of Sacramento residents to report missed service for “solid waste” pickup. (Read “garbage”).


www.foxnews.com/travel/2014/01/14/airline-passenger-falls-asleep-with-finger-on-slash-key/
AirPassengerFallsAsleepOnSlashKeyWe know that poor ventilation can sometimes leave airline passengers feeling sleepy.

But one busy traveler drifted off on his flight –but not before he took his finger off his laptop keyboard.

A video uploaded on YouTube showing the sleeping man with his finger stuck pushing the ‘////////////’ key on his keyboard went viral, and has been watched 100,000s of times.

Entitled “Dude sleeping on jet w/finger on slash key,” it was apparently shot by his seat mate.

Display All the JPEGs on Your Computer

Display all the JPEGs on your computer, regardless of folder, on a personal webpage. Refresh the data any time. Requires MS-Access, and the freeware Effective File Search.

Export the data to the desktop. Dynamically Import/Link them in Access, so you can refresh the file list any time. Table Name: Jpegs | Field Name: path

Make a Query that your web browser will understand.

Native MS-Access:
hyper: “<br /><img src=¤file:///C|” & Right(Replace([Jpegs]![path],”\”,”/”),Len([Jpegs]![path])-2) & “¤ />”

SQL:
SELECT “<br /><img src=¤file:///C|” & Right(Replace([Jpegs]![path],”\”,”/”),Len([Jpegs]![path])-2) & “¤ />” AS hyper
FROM Jpegs;

Replace ¤ with quotation mark

The HTML

 

Why I use Avast Anti-Virus

http://www.pcmag.com/article2/0,2817,2412859,00.aspz

Report: Anti-Virus Products Fail to Guard Against New Attacks

Security Troubleshooting Techniques

Anti-virus products on the market provide zero protection against new, unreported computer viruses and take weeks to update their signatures to handle such security threats, according to an eye-opening new report from Imperva.

The data center security solution provider called the more than 40 anti-virus software products it tracked for a recent study “woefully inadequate” at protecting IT assets from 82 newly created viruses that company researchers unleashed on them.

Imperva also reported that it took “up to a month or longer” for three-fourths of anti-virus solutions to add those viruses to their signature lists and begin protecting against them.

Consumers and businesses spending big money on such products are only getting an “illusion of security” in return, the company said in its most recent Hacker Intelligence report, which details the findings.

“Enterprise security has drawn an imaginary line with its anti-virus solutions, but the reality is that every single newly created virus subverts these solutions without challenge,” Imperva CTO Amichai Shulman said in a statement. “We cannot continue to invest billions of dollars into anti-virus solutions that provide the illusion of security, especially when freeware solutions outperform paid subscriptions.”

In fact, Imperva found that two free anti-virus solutions—Avast and Emsisoft—were on the short list of tested products that “provided protection” from emerging IT security threats.

Imperva noted that it would be impossible for any anti-virus product to identify and quarantine a brand new virus, but cautioned that the real issue was the lag time between information about such threats becoming available and the three weeks on average it took the tested AV products to finally address them.

“Investment in anti-virus is misaligned—In 2011, Gartner reported that consumers spent $4.52 billion on anti-virus while enterprises spent $2.9 billion, a total of $7.4 billion or nearly a third of the total of $25.4 billion spent on software security. It is impossible to justify a return on investment for this massive expenditure when freeware solutions prove equally or more effective than paid solutions,” the Imperva report stated.

The company’s researchers used The Onion Router (TOR) proxy “to safely obtain more than 80 viruses from clandestine websites, which were run through a database of more than 40 anti-virus solutions to ensure they had not been previously reported.”

Despite its findings, Imperva said it would “not recommend completely eliminating [anti-virus] from an effective security posture” but said security teams should complement AV software by “focus[ing] on detecting abnormal behavior such as unusually fast access speeds or large volume of downloads and adjust[ing] security spend on modern solutions to address today’s threats.”