background preloader

Computer Hardware

Facebook Twitter

Venetian carnival masks. HotHardware: Tech, Computers, Gadgets, Reviews, News - Burned In. Hardware Canucks - The Latest Computer Hardware News and Reviews. Overclock.net - Overclocking.net. Gizmodo, the Gadget Guide - Pentadactyl. The Making of a Motherboard. By: Carl Nelson [06.03.04] Since we were in Taiwan, we took the opportunity to visit Gigabyte's Nan-Ping factory, close the the center of Taipei. Nan-Ping is actually one of four full-size Gigabyte factories; two are in Taiwan, and two are in China. I focused on getting photos detailing all the steps necessary to build a motherboard, as Gigabyte does it! Pictures were taken with two cameras, as batteries drained and memory cards filled... So bear with me if the order is slightly askew ;) Let's get started right away! SMT Room The SMT lines are where the assembley begins, really.

Here you can see the traces being made on a motherboard. Beside each SMT machine, you will see various chips ready to be attached to the boards. The rest of the smaller chips, such as these IC chips, are kept on rollers. Once the boards roll off the SMT lines, they are inspected to make sure all the connections are made properly.

Next Page: (2) Can You RUN It? Newegg. TigerDirect.com - Computers, Computer Parts, Computer Components, Netbooks & Electronics. List of cognitive biases - Wikipedia, the free encyclopedia - Pentadactyl. Systematic patterns of deviation from norm or rationality in judgment Cognitive biases are systematic patterns of deviation from norm and/or rationality in judgment. They are often studied in psychology, sociology and behavioral economics.[1] Although the reality of most of these biases is confirmed by reproducible research,[2][3] there are often controversies about how to classify these biases or how to explain them.[4] Several theoretical causes are known for some cognitive biases, which provides a classification of biases by their common generative mechanism (such as noisy information-processing[5]).

Gerd Gigerenzer has criticized the framing of cognitive biases as errors in judgment, and favors interpreting them as arising from rational deviations from logical thought.[6] Explanations include information-processing rules (i.e., mental shortcuts), called heuristics, that the brain uses to produce decisions or judgments. Belief, decision-making and behavioral[edit] Anchoring bias[edit] Magic MICRO Computers. Build to Order Gaming Computer, Custom Barebone PCs, Gaming Laptops, Order PC Parts. Computer Geeks. Computer Parts Database. Your long search for a program to track your Computer Parts Database is over! If you are in need of a quality program for maintaining your computer parts database, Instant Quote Professional is for you! Using this powerful parts database software, you can create invoices in seconds by using a fully customizable Parts Database of all of your Computer Parts that you create and maintain.

Simply add computer parts to a new Invoice at the click of a mouse, and let our software do the rest! This program can handle ALL of the parts data for your computer sales and quotes. Additionally, Our Computer Parts Database Software supports: Quote and Invoice tracking, by Customer. Maintain a Parts Database, navigated using tree-view style part categories, to easily add computer parts from the database. Search all Computer Parts Sold and Quoted using our full-screen search facilities. Parts can be either Labor or Taxable parts, including the ability to store detailed part specs and a part picture for each. The Tech Report - PC Hardware Explored.

XtremeGear - www.BuyXG.com. Frozen PC. Oldcpu.cz. Learn about computer parts. Hardware Revolution. Alienware Computers - Custom-Built Gaming Desktops and Laptops. MDPC 028 | by Pius Giger aka Lessdegrees. Performance PCs.com. All CPU Sockets. Since the very first CPU, both Intel and AMD have been creating several different sockets to be used by their processors. In this tutorial, we will list all socket types released to date with a list of compatible CPUs. In the beginning, a CPU socket was compatible with just one kind of processor. This scenario changed with the launching of the 486 processor and the massive use of ZIF (Zero Insertion Force) sockets, also known as LIF (Low Insertion Force). The ZIF socket has a lever that installs and removes the CPU from the socket without the need of the user or the technician to press the CPU down in order for it to be installed on the socket.

The use of this socket greatly lowered the chances of breaking or bending the CPU pins during its installation or removal. Since then, both Intel and AMD have been developing a series of sockets and slots to be used by their CPUs. The first Pentium processors (60 MHz and 66 MHz) used a pinout standard called socket 4, which was fed with 5 V. BiX Computers. Computer Cases-Parts-Motherboard Parts-Modular HPTX-SR2 Motherboard tray assembly. This item is IN STOCK! BEHOLD THE MASSIVE HPTX (EVGA SR-2) Modular Motherboard Tray. This tray was designed specifically around the specifications of the highly anticipated Dual 1366 Socket motherboard slated as the SR-2 from EVGA. Mountain Mods is FIRST to the market for a completely compatible tray for this beast of a board. Mountain Mods has also included reverse compatibility into the motherboard tray.

U2-UFO Extended U2-UFO Ascension Extended Ascension Pinnacle 18 Pinnacle 24 Some compatibility issues will arise with some (Non Extended) U2-UFO configurations. There is one compatibility issue with (Non Extended) Ascension cases. Other cases will have zero spacing issues unless water cooling radiators are implemented into the front panel of the chassis. This tray can be used on its own as a test bench, or in conjunction with any case in the list above w/the 10 PCI case back panel. Building your own box? Choose the tray finish and whether or not you want the optional security flange.

1.877.243.8266 | World's Largest Selection of PC Modification Supplies. Hardware. How to use Google for Hacking. | Arrow Webzine - Pentadactyl. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.

The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. intitle:”Live View / – AXIS” 2. 3. . “? 4.