TechMount

Archive for March, 2004

Sharp Zaurus SL-6000L

The Sharp Zaurus SL-6000L has finally made it to the U.S. The new handheld has reached enterprise level and is will be very usful tocorporate users, high-end gadget lovers andmobil hackers

The SL-6000L is the international version of the device and is offering only integrated Wi-Fi. Unlike the original Japanese version (SL-6000) which is available in either dual networking (Wi-Fi and Bluetooth) or networking-less versions.

The new Zaurus has a 4-inch 480 x 640 CG Silicon reflective screen that is much larger than the one in the older models. The screen supports rotation on the fly (portrait and landscape). This unique display provides the user with extremely high resolution viewing of both moving and still images. In addition, CG Silicon screens optimize the properties of both transmissive and reflective modes, providing outstanding resolution and clarity under virtually any lighting condition, even bright sunlight.

Sharp has also incorporated a sliding thumb keyboard into this model (it’s about time).

Like other Zaurus models the SL-6000L runs Linux in the Trolltech’s Qtopia environment. It features 400 MHz Intel XScale processor and 64 MB of RAM and the same amount of ROM memory. It is also equipped with one SDIO slot for extension and a USB Host, and comes with a swappable 1500mAH Lithium-polymer battery.

Running WebSphere Everyplace Access software on the Linux-based device, remote workers are able to access Web applications like PIM and e-mail and also be able to retrieve information from IBM’s DB2 database software. The Sharp Zaurus also supports IBM’s WebSphere Everyplace Multimodal Environment for Embedix, which allows end users to run multimodal applications. Users can choose to maintain their connection outside a corporate LAN by using an optional high-speed 1xRTT service through a Compact Flash card solution offered by Sprint.

In addition to a Compact Flash slot, the Zaurus SL-6000L has a SD/MMC slot and an expandability jacket with an additional Compact Flash slot and battery. By using an expansion jacket, corporate users can actively update a server through a wireless connection over 1xRTT service while scanning barcodes with an optional barcode module plugged into the expansion jacket.

The SL-6000 is designed to be more rugged than common handhelds, and can withstand a drop from approximately 1 meter.

The feature-packed Zaurus SL-6000L can be used as a laptop replacement. It has 64 MB of protected flash memory and SDRAM, a high-powered Intel Xscale 400MHz processor and extra long battery life with a rechargeable, replaceable 1500 mAh Lithium polymer battery supporting typical business use. Power users with needs spanning more than the average business day can use the supplemental battery equipped expansion jacket.

Technical data: Model: SL-6000L
- Operating System: Embedded Linux with J2ME CDC Personal Profile
- Memory: 64 MB SDRAM; 64 MB Flash
- Processor: Intel Xscale 400MHz processor
- Display: 4 inch 640 x 480 CG Silicon transflective TFT
- Wireless: Integrated 802.11 lb
- Keyboard: 37-key QWERTY keyboard with slide cover
- Expansion Slots: 1 Type II CF slot; 1 SD slot
- Input/Output: USB 1.1 host connector mini Type-A, IR port, 2.5 millimeter stereo headphone/headset jack, docking cradle connector, 80-pin expansion connector
- Size: 3.14 inches by 6.22 inches by .80 inches
- Weight: 7.1 ounces

  • 0 Comments
  • Filed under: Hardware
  • PHP 4.3.5 released!

    The PHP Development Team announced the release of PHP 4.3.5. This is a bug fix release only, without any new features or additions. This release includes a fix for more than a hundred known bugs. Check the change log and see if you need to make the update.

    NTP is a protocol designed to synchronize the clocks of computers over a network. NTP is now in it’s 3rd version. NTP version 4 will be a significant revision of the NTP standard, and is the current development version, but has not been formalized yet.

    Configuring a Linux box as a time server can help all LAN workstations keep the correct time. This helps when people are sharing files or your servers are doing any kind of synchronized activity. Inaccurate times and dates can cause all kinds of problems with user profiles and system policies on all sort of systems It’s fairly easy to setup and configure and does not demand a lot of resources from your server. The main page of NTP have a lot of details about the server and links to the current install files. You will need to download the current install package and check the documentation for more details.

  • 1 Comment
  • Filed under: Systems
  • Send mail through SMTP

    Back in the old days we used to use this method to send mail all the time. That is beside the tendency to trick our less knowledgeable friends. They used to get mails from god@earth.net or devil@hell.org and so on.

    What you basically need to make it work is an address of a mail server capable of relaying for you. That might be your local SMTP server or the one of your ISP. There are some open SMTP servers which will accept connections from anywhere but these are slowly disappearing.

    Step 1 – Connect to the SMTP server
    telnet mail.domain.com 25
    The reply will be:
    Connected to mail.domain.com
    Escape character is ‘^]’.
    220 mail.domain.ext ESMTP Sendmail …

    Step 2 – Declare where you are sending the email from
    HELO local.domain.name – Here is the nice trick, you can declare your local domain name as anything you want. Although you really should use your real fully qualified domain name as seen by the outside world, but the mail server has no choice but to take your word for it.
    The reply should be
    250 mail.domain.com Hello local.domain.name [loc.al.i.p], pleased to meet you
    Step 3- Give your email address:
    MAIL FROM: mail@domain.com
    It should yield:
    250 2.1.0 mail@domain.com… Sender ok
    Step 4- Give the recipients address:
    RCPT TO: mail@otherdomain.com
    It should reply with:
    250 2.1.0 mail@otherdomain.com… Recipient ok
    Step 5 – To start composing the message issue the command:
    DATA – In the new line after it you can type you actuall messege.
    If you want a subject for your email type Subject: – Followed by a subject line and two enters.
    Step 6 – To tell the mail server you completed the message enter a single “.” on a line on it’s own.
    The mail server should reply with: 250 2.0.0 ???????? Message accepted for delivery
    Step 7 – Close the connection by issuing the QUIT command.
    The mailserver should reply with something like: 221 2.0.0 mail.domain.ext closing connection
    Connection closed by foreign host.

    Thats it. Try it and have fun.

    Java won’t be open source

    Despite urging from competitors and open source advocates, Sun Microsystems will not open the source to its Java programming language, said Sun CEO Scott McNealy during a news conference at the 2004 FOSE conference. “We’re trying to understand what problem does it solve that is not already solved,” McNealy said.

    Last month Eric Raymond, a noted open source programmer and president of the Open Source Initiative advocacy group, posted an open letter to McNealy calling for Sun to make Java open source.

  • 3 Comments
  • Filed under: Corporate
  • Fascination by randomness

    I have been fascinated by randomness and the “game” of probabilities for a long time. This is the main reason I was happy to find this website. The underlying technology for this showcase was developed by the Group of Applied Physics of the University of Geneva in 1998. The system exploits an elementary quantum optical process – namely the reflection or the transmission of a light particle on a semi-transparent mirror – to produce binary random numbers. The quantum random number generator technology was commercialized by id Quantique, a spin-off of the University of Geneva.

  • 0 Comments
  • Filed under: Webmarks
  • Microsoft is guilty in the EU

    Microsoft faces an unprecedented European Commission decision on Wednesday that will brand it an abusive monopolist (like we didn’t know it so far), order it to change the way it does business and fine it a record 497 million euros ($612.7 million). After a decade of investigating Microsoft and making deals only on small issues without any formal findings, the European Union executive has decided that more sweeping action is needed to restore competition.

    Microsoft will be ordered to offer a version of its Windows operating system without Windows Media Player and to encourage computer makers to provide other audiovisual software. Microsoft must also license information to make the servers of rivals more compatible with Windows desktop machines. Windows runs more than 95 percent of all personal computers.

    Microsoft has announced plans to appeal the decision to the courts and will try to get the remedies delayed until the final court appeals are over, a process that could take years. That limits the immediate impact of the Wednesday decision. I expect it will end with Windows Media Player embedded so deep for so long into the system that the decision will be too old when its time to implement it.

  • 0 Comments
  • Filed under: Corporate
  • New Double-Layer DVD Burners

    If you bought a DVD burner last year you are due to be disappointed. Sony Electronics is looking to heat up the DVD recording arena. The company is adding two DVD+R Double Layer (DL) DVD drives to its line of Dual RW burners. An internal DRU-700A drive and an external DRX-700UL drive represent the company’s move into double-layer recording. This move comes after a few other products are already reaching the market or due to be launched very soon.

    The new Sony burners and accompanying compatible discs promise to almost double the storage capacity of currently available recordable DVD discs. Users will be able to store four hours of MPEG-2 video or up to 8.5GB of multimedia data on a single disc. Sony officials say the initial burners will have 2.4x DVD+R recording speeds, 40x CD-R speeds, and 24x CD-RW recording speeds – As we seen in the past those can be accelerated using firmware updates.

  • 0 Comments
  • Filed under: Hardware
  • Validate corrupt RPMs

    Have you ever tried installing an RPM and things seem to go wrong even before anything substantial is happening? During those occurances you will get errors like “V3 DSA signature: BAD, key ID” or sometimes the installation process will not generate any errors while the application doesn’t seem to work properly. This might be a sign that the RPM you downloaded has been corrupted in some way. The fact that its corrupted does not mean necessarily that the installation will not complete “successfully”.

    One way to find if the downloaded RPM iis complete is to use the rpm2cpio utility. As the name implies, rpm2cpio takes an RPM package file and converts it to a cpio archive. rpm2cpio is basically only a filter and is part of any Red Hat installation, there is some more information about it here.

    You will find if your RPM is corrupted by using rpm2cpio in this manner:

    rpm2cpio | cpio -t

    If you get the messege ‘unexpected end of file’ or ‘cpio: premature end of archive’ you’re onto a bad RPM file.

    Corrupted RPM can get distributed because of various errors like accidentally sync’ing an incomplete copy of a file or maybe or mistakes during resyncing of mirror sites.

    When the guardsman turn on you

    security researchers warned on Friday about a software component of Norton Internet Security could allow hackers to use the application as a backdoor.

    The flaw occurs in an ActiveX component used by security firm Symantec’s flagship desktop security program, Norton Internet Security, according to an advisory published by research firm NGSSoftware. The security hole could be used to run an attack program that would then take control of the computer that the software was trying to protect.

    Symantec’s Antispam software has a similar issue caused by a different ActiveX component. Symantec released fixes for the flaws which can be downloaded from its site, using LiveUpdate, the standard update mechanism included with the programs.

    So who is guarding you from your guardsman?

  • 10 Comments
  • Filed under: Security