You’re playing an online game with your friends when your boss calls you. “Be right back!” you tell them. You answer the call and greet your boss, who tells you that you’re needed at work tomorrow. You hang up and curse under your breath, but your friends heard you.
All communication in the above scenario has been sponsored by the microphone! Yes, folks, the device that’s been bringing you someone else’s voice for 140 years is still here, and better than ever! Modern microphones are a technological wonder, capturing sound waves and sending them thousands of miles away. How do they do it? To understand this, we first need to understand sound waves. Your voice – or any sound for that matter – is a standing wave that is set up using the air particles around you. Your vocal folds create subtle but powerful pressure changes in the air in your throat, and these pressure changes propogate out in to the world around you. Inside of your microphone, there is a small membrane of metal, plastic, paper, etc. known as the diaphragm. As the pressure in the air changes, the diaphragm moves back and forth with the air particles. Attached to the diaphragm is a small magnet, which is pushed in and out of a coil of wire. The moving magnet causes changes in the magnetic field around the coil, which induces a current. Different volumes, pitches, and types of noises will vary the current that is induced, which is how a microphone can pick up such a wide variety of sounds. The generated current is translated into digital binary by either a small built in processor (in the case of a USB microphone) or some hardware implementation like a soundboard. The digital content is then sent across the country to your friends, or down the road to your boss.
It’s pretty amazing how something so common in our everyday lives can take some air particles that were wiggling around in your throat, turn them into ones and zeros, and send them wherever you want. Thank you, electrophysics!
I’m sure you’ve seen the blue wires stuck up above your ceiling tiles at work or in your basement. Those are ethernet cables that are run from your home’s switch or patch panel and terminate at the ethernet jacks in your wall. They’re functionally the same as the ethernet cable that plugs into the back of your motherboard, but these are behind-the-scenes and not intended to be seen. They ensure that you stay connected and have the quickest connection possible. But quickness wasn’t always an option. Continue reading On Ethernet Cables
It takes a whole lot of engineering to make a device work as well as possible. As I’m sure you know by now, electrical engineers and hardware engineers like to use valuable materials in their products, as these materials often have desirable properties. Gold and silver, for example, conduct electricity extremely well, and neodymium is a powerful paramagnetic substance. Aluminum is used in surplus, so this is less desirable, but it is recycled nonetheless.
When you give your old devices to a tech recycler, you are one of millions that do the same. In this way, recyclers are able to obtain thousands of tons of material in bulk at a very low price, so they earn much more than their money back when the device is through. This is why they can make money this way, but you or I cannot; we just don’t have the resources to get massive quantities of technology.
When they first bring in the electronic scrap, most of it consists of old PCB. This type of waste is relatively easy to obtain gold from and results in a high return on investment. They separate the PCB material from other waste via magnets, filters, and conveyor belts, which take the PBCs to a shredder which will completely tear apart the waste. The shreds are then left in a solvent, which will completely dissolve the printed fiberglass and leave just the copper, gold, silver, aluminum, platinum, etc. This scrap metal is then separated again to ease the rest of the process. Many recyclers have their own methods for doing this, including but not limited to using a mixture of nitric acid and hydrochloric acid (otherwise known as Aqua Regia) to dissolve out the gold and platinum, but leave other metals untouched. Regardless of the process chosen, the separate metals are then melted down and purified so that they can be sold. This typically results in an impressive profit, but another benefit that these companies receive is tax benefits. Tech recycling is a huge industry, and without them, landfills would be overflowing with random tech junk.
So go ahead and let your old junk go. It might end up in your spouse’s wedding ring later in life.
For the uninitiated, a VPN (Virtual Private Network) is a great way to ensure that your internet connection is secure, private, and encrypted. There’s a lot to them, and I’m not going to delve too deep into them, but this is definitely something that everyone should look into.
The basic idea is that you pay a VPN provider for their service. In return, you send all of your internet traffic to them through a tunnel that nobody can get through but you. This tunnel is virtual, it is private, and it acts just like a network. This is where the name comes from. Nobody but the provider can see the traffic. For a better idea, here are three pros and three cons of using a VPN to protect yourself online. Continue reading Pros and Cons of a VPN
Have you ever dropped your smartphone, or it just simply won’t hold a charge? Well if you go to your local cellular retailer, unless you have insurance, you may be in for some serious sticker shock. A new flagship phone may cost at least $700, up from the old days when carriers gave you a discounted or even free phone in exchange to being on contract for two years. Now, unless you can afford to outright buy a phone, you finance it at 0% interest for two years.
Apple care charges about $130 for a screen replacement, if you have apple care. This is in addition to the purchase of the apple care plan beforehand. Most phones cost no more than $150 to repair the screen, and about $100 for a simple battery swap, assuming that the battery is non removable. If you can remove the battery yourself by removing the cover, it is significantly cheaper of course.
We do not service phones here at Bendy Computers, or repair hardware of any kind, but are more than happy to refer you to someone who can. In Maryland, Beyond Electronics at White Marsh Mall is a full fledged store offering repairs and used phones that we recommend. I have personally used them, and can attest to their quality workmanship.
Open Office is an open source suite of productivity software. It is made by the same people who make the very popular Apache web-server software. It includes a word processor, spreadsheet program, presentation program, graphic design program, and database program. Not only is it 100% free, it is light on system resources, can save in Microsoft and PDF formats, in addition to it’s own format. Why pay for an office subscription forever when you can get the same thing for free? https://www.openoffice.org/ If you need help setting it up, we can do that remotely for $15 for you.
Many people have heard that the latest flagship phones from Sony, Samsung, and Apple have water resistance. Maybe you have read the box and noticed something called an, “IP Rating”. IP, stands for ingress protection. Basically, how well does the product stand up to entry of both solid particles like dust, and liquids like water.
The first number is for solid protection and goes from 0, for no protection, to 6, for total protection. The second number is for liquid protection, 0 for none, to 9k for protection against close-range high pressure, high temperature spray downs.
Almost all phones marketed as, “waterproof,” have a solid protection rating of 6. This means that if you work in construction or another dusty environment, your phone will handle it just fine. Most phones have a water protection rating of at least 7, which allows for submersion of 1 meter for a short time, so long as all covers are sealed and nothing is plugged into the device for about two hours.
Keep in mind, your liquid protection does not apply to salt water usually, and trusting a $25 case to protect a $800 phone is a bad idea. But, if a rain storm should happen to strike while you’re making a call, or you spill your coffee; your phone will be ok as long as the ports are sealed. To ensure your ports are always sealed, you may want to use wireless headphones, since they don’t need to connect to an uncovered port.
Ransomware is a type of malware that holds the information on your computer hostage in exchange for a ransom. Usually, there is a deadline to pay the ransom, and a means of contacting the people holding your data. Your data will still be on your hdd or ssd, but the ransomers encrypt it, and they and only they have the key to decrypt it. The FBI says that you should not pay the ransom, as there is no guarantee that the ransom holders will give you the decryption keys. The best defenses against a ransomware attack are as follows.
- Make sure all security updates and patches are installed.
- Have both network and non network backups, such as flash drives or dvds.
- Download files only from sources you trust, or use www.virustotal.com to scan links and files before opening them.
- Change the name of default user accounts on your system, as well as the passwords.
- Make sure to use a non admin account on your computer. This way, malware may not always get admin access to your system.
Many people are familiar with the term, “Hard Disk Drive”, but have no idea what it means and why they should care. Same with, “Solid State Drive”. Let the experts at Bendy Computers break it down for you.
- Stores files permanently on moving magnetic disks, called platters.
- Usually is cheaper and has more space than a SSD.
- Is slower to load than an SSD.
- Is very vulnerable to drops.
- Stores files permanently on flash memory.
- Has no moving parts, and thus is more durable.
- Is more expensive than a HDD of the same size.
- Loads significantly faster than a HDD.
Has this ever happened to you? You get an email, file, or link you want to open; but aren’t sure if it’s safe? Fret no more. Just go to http://www.virustotal.com and enter the link, or upload the file in question. It will scan it with multiple anti malware engines to give you a heads up if you’re headed for dangerous waters. Should you get infected anyway, we have you covered at a good price. One of us even has a degree.