SaaS System Top 10 Design Issues

Software as a Service (SaaS) is a new software delivery and business model for ISV’s.

The SaaS delivery model involves delivering the application as a service, over the Internet.

The SaaS delivery model requires that the application either be designed from the beginning as a Multi-Tenanted (MT) SaaS application, or be a Single Tenanted (ST) application re-engineered for Quasi-SaaS operation. These features differentiate SaaS applications from the legacy ASP/Hosting model. They also differentiate SaaS applications from the Virtualization model, which has very little to do with SaaS and is more concerned with datacenter efficiency.

The SaaS business model involves an agile, Internet application based business that leverages advanced software architecture to quickly build a large user base at relatively low initial cost per user.

Taking a conventional application package and providing it as a hosted service (legacy ASP-Hosting model) is not SaaS. Even adding Virtualization does not constitute SaaS. If a hosting company hosts 100 separate instances of a software package, there are 100 software instances to install, maintain and (worst of all) customize. This model is not scalable and fails at low numbers.

The importance of SaaS is that it represents a complete paradigm shift that gained momentum around the year 2000 for the development and delivery of application software. SaaS is now reshaping the ISV landscape, leading to considerable re-organization within the software package industry.

To realize the SaaS opportunity, SaaS System designers/developers have to overcome the following, Top 10 design issues/challenges:

1. Multi-Tenancy
How to design an application that supports hundreds/thousands of companies.

2. Security
How to ensure that customer data is secure and that there is complete separation of data from one Tenant Company to the next.

3. Scalability
How to develop an application that can cope with say, 1,000 companies and 30,000 individual end users.

4. Availability
How to develop an application that can consistently delivers 99.5+% availability.

5. Performance
How to develop an application that can deliver < 500 ms transaction processing times, at the data centre.

6. Extensible Data Model
How to develop an application that can accommodate say, 1,000 system administrators. Each administrator being able to tailor the database to the needs of each company without affecting the others.

7. Customizable GUI
How to develop an application that can enable tenant company system administrators to customize the GUI that their end users see.

8. Customizable Business Logic
How to enable individual tenant companies to add their own business logic.

9. Workflow
How to design a system, so flexible, as to allow customers to add their own workflows to the application.

10. Internationalization
How to develop an application that can be used by companies and end users around the world.

Once the challenges have been overcome, the ISV has a scalable, flexible, secure, performance SaaS application, powering an agile SaaS business. Typically the SaaS model offers the following benefits:

Efficiency
Enables hundreds or thousands of companies to access centralized application software.

No Distribution
Avoids the need to physically distribute software to hundreds or thousands of customer locations.

Lower customer support costs
Ensures that all customers use the latest copy of the software. Eliminates the need to support previous versions of software. Provides substantial savings in customer support.

Lower barrier to entry
Lowers the entry level for customers and transforms a substantial investment in a perpetual software license fee to a modest monthly rental fee. Enabling the rapid building of a large user base.

Business Agility
Provides the basis for unparalleled business agility. A successful ISV can scale quickly and achieve global reach, without all of the costs and delays associated with conventional software houses.

In addition to challenging software development issues, there are also operations issues, arising because the customer no longer has responsibility for providing server-side infrastructure. The SaaS application runs on a central system, controlled by the ISV.

Similarly, whereas a traditional ISV may have experience of developing an application with an acceptable level of performance when being used by say 50 users in each customer company. In the SaaS model, the ISV must gear up to having a centralized n application supporting, say 500 companies having 50 users each = 25,000 users. That is a full two orders of magnitude difference in scale.

Understandably, few conventional ISV’s have the necessary experience and skills required to meet all of the primary design challenges. Most ISV’s will therefore need external help to design a SaaS application.

The Author is a independent SaaS development consultant providing SaaS design service and SaaS development to know more about the service please visit http://www.saas-attack.com

Tags: , , , , , , ,

Basic Computer Security

Basic computer security is essential as the internet is constantly expanding and as it does so do the threats from malware, viruses and rogue programs. There are many ways that hackers and well organised criminal gangs will try to infiltrate your system so you need to take a pro-active role in defending your computer against such threats.

Whether you use a dial up connection or high speed, you need a good firewall which will monitor inbound traffic as well as outbound. The built in firewall offers little protection but it is better than no firewall at all and if you have a wireless router, many of these have a built in hardware firewall which can be configured to add another layer of security to your system.

Some advocate that with a router you don’t need a software firewall, but the advantage of a software firewall is that you can easily monitor inbound and outbound traffic. If you use a router, how often do you check your router logs?

You need a reliable antivirus program. The majority of computers come with pre-installed trial versions of Norton or McAfee but these can be a resource drain. There are many free firewalls and antivirus programs which offer excellent protection as well as the option to upgrade to the pro version.

Check your firewall at Gibson Research. This will check your firewall for vulnerabilities, open ports, file sharing and messenger spam, not to be confused with Live Messenger but the inbuilt Windows Messenger service.

Also direct your browser to pcflank where you can run several tests, scroll to the bottom of the page and look at the options recommended based upon your level of experience.

Anti-Virus

Many users have their own preferences and stick with what they know, this is not necessarily the best that is available. AVG has been the most popular for some time, but it has also encountered many problems and has become more bloated but there are many alternatives.

Essentials:

On your Desktop, create a New Folder and rename it ‘Downloads’ so that ALL program downloads are in one easy to find location.

One Firewall, One Antivirus, generally TWO Anti-Malware programs.

Bear in mind that each PC is configured differently, and there is no ‘one size fits all’. What works for one user may not work as well for another, because they have different programs and configurations, so you need to play around to find out what works best on your system.

Tweaking programs allows you to create a balance between the best protection against the minimal intrusion which constantly asks for permissions . It may take a few days for you to get the settings to your liking, but it will be worth it.

Prevention and taking a pro-active role in protecting your PC is the best way to deal with many of the threats from spyware and malicious downloads. Stopping it is much easier than removing it once it has installed itself.

DO NOT click unknown links on websites or in emails and DO NOT be fooled by the promises of programs that can scan and clean your computer or clean your registry, many contain malware and do more damage.

Also ensure you back up your registry in the event you need to restore from a good working copy. Go to Start > Run and type in regedit which will open the Editor, click on ‘File’ and then ‘Export’.

Whatever programs you use, they should prevent spyware installation and virus infections. If they fail to do so, then change programs to ones that will protect your system. Once malware gets installed, eradication can become time consuming and difficult and prevention is much easier than cure.

http://freepcsecurity.co.uk/2009/05/05/basic-computer-security

Colin Richards

Tags: , , , , , , , ,

Outlook Express and Malware Registry Entries Can Slow Down the Processor

Anyone that uses their computer to get information online, whether they are using Outlook Express for e-mail or a web browser, knows that the risk of getting malware is fairly high. Any time a computer gets information from the Internet, that information can contain malware.

As long as the majority of computer users run any of the Microsoft Windows operating systems, there is a necessity for at least three types of programs to be installed. The three most important programs any Windows user needs is a virus protection program, a malware removal program and a registry cleaner.

Those that use their computers daily and use programs like Outlook Express and Internet explorer are sometimes more at risk of getting malware on their PCs that can make registry changes that are hard to fix, even when the malware has been removed. These registry changes can slow down the computer by causing the processor to actively try to run applications that are not even on the computer.

Most people that use their computers every day will quickly start to see their PCs slowing down over time as these old or redundant registry entries begin to pile up. Every time a computer user adds or removes a program there is a change to the registry. Also when using programs like Outlook Express, the accounts that are set up to retrieve e-mail have registry entries, so when these settings are changed some of the entries can be left behind causing the processor to slow down.

All of us have experienced some type of computer problems and fumbled around to try to fix them. On occasions people have damaged their registry trying to fix a problem. Trying to remove malware manually is a very common cause of registry damage. Most malware programs can add all kinds of crazy registry entries and when improperly removed can cause damage that can slow a computer down even more.

To speed up any computer running a Windows OS most people would recommend starting by turning off auto start up programs. When these options are changed there is typically a change to the registry. Then remove programs that are not being used at all on the computer. After that use some type of good registry cleaner program. These few steps will take only a short period of time to do, but could help speed up a computer considerably.

With its advanced registry cleaning technology, Optimize-Your-PC can help you fix PC errors, including those found in Outlook Express, and have your PC running like new again in under 2 minutes!

Tags: , , , ,

It’s Time to Teach the Spammers a Little Lesson

Spam is no recent phenomena. It has existed ever since the rise of the internet and will continue to do so. A recent study from McAfee has pretty much summarized the seriousness of the problems which spam creates. Did you know that as a result of spam alone, 33 billion kilowatts-hours of electricity was wasted in 2008? And this only accounts for America. Imagine what the total would be with the whole world combined. Another statistic revealed that $3 billion worth of electrical energy is lost through spam. Why is this the case? At an individual level, a single spam email emits about 0.3 grams of Carbon Dioxide, a greenhouse gas. If you multiply that with the number of spam emails being sent around the net, an estimated 62 trillion spam emails, that turns the final value into around 17 million metric tons of Carbon Dioxide.

So what exactly is spam? Spam is a term for any unwanted or unsolicited junk emails you receive on your email service. There are many variations in spam emails. The most common ones are those which attempts to ‘sell’ you products such as viagra, asks for your personal information and claims which state you have won a lottery or award. Did you know that when McColo, a U.S.-based Web-hosting service that was responsible for much of the world’s spam, was shut down in 2008, the result was an annualized carbon dioxide savings equal to taking 2.2 million cars off the road? This shows that we can reduce the number of spamming effectively by taking actions against the ISP (Internet Service Providers) alone. Unfortunately, many of these victories are short lived as spammers are like weeds, they’ll migrate to another ISP and regrow their spam sending capacity once more. But what if the whole world took action? What if everyone was able to identify the origins of a spammer and rally against ISP to shut the spam accounts down? In reality, it is an utmost impossible task to encourage the 6 billion netizens to all take action at once but it is still an action worth taking as an individual. All it needs is one viable complaint and kabem! A small but significant percentage of spammers could be gone.

So how do you identify the origins of a spam email? Unfortunately, email services have evolved to a state which allows people to send spam using bogus email addresses. However, there are some ways to get around this and find the real identity of the user. Let me explain how.

Identifying the real source of the spam mail

Luckily for us, email headers can tell us a lot of something. Spammers maybe able to forge a bogus email but they may not realize their whereabouts could be identified, just from the header alone. Luckily for us, there are free website services which do all the analyzing for us. However before you start, you fist need the original HTML code of the email header. Many emails should give you the option to change it to HTML view. For Gmail, click the downward arrow button next to the reply button and click ‘Show Original’. Once you have the HTML code, copy it and go to the Spam Origin Locator website (Search Geobyte Spam Origin Locator on the search engine). Paste your HTML code into the text book and click submit. You should now have a table listing the origin of the spam email address!

Wait, you’re not done yet! You now need to identify the ISP of the IP address. How? You need to run a function called tracerroute. To open this, open run and type in ‘cmd’ to open the command window. Now type in ”tracert xxx.xxx.xxx.xx” (Xs being the ip address) which will run the tracer route. You should now be able to see the ISP of the ip address.

This is an example of what you might see.

traceroute to 62.105.106.207 (62.105.106.207), 30 hops max, 38 byte packets
1 hsrp2.cc04-wien.AT.eunet.at (193.154.165.1) 0.952 ms 0.820 ms 3.707 ms
2 r2-ge1-3-0-95-ixi1.vie.at.eu.net (193.80.94.11) 1.556 ms 1.473 ms 1.179 ms
3 so-2-2-0.vie20.ip.tiscali.net (213.200.79.33) 1.388 ms 1.733 ms 1.327 ms
4 so-7-0-0.ams10.ip.tiscali.net (213.200.81.174) 19.123 ms 19.428 ms 19.298 ms
5 he12.core.rtr.gxn.net (195.69.144.95) 27.890 ms 27.575 ms 28.196 ms
6 gb0-1-2-llb-x-many.HE23.core.rtr.gxn.net (194.143.163.38) 29.572 ms 28.312 ms 28.382 ms
7 p8-0-0.tn-cr12.cix.gxn.net (62.72.156.142) 32.931 ms 32.683 ms 32.312 ms
8 f2-0-97.tn-cr57.cix.gxn.net (62.72.148.2) 33.155 ms 34.170 ms 33.110 ms
9 g0-1-91.tn-hg11.cix.gxn.net (62.105.94.254) 34.354 ms 37.704 ms 34.311 ms

As you can see, trace route was able to identify more than one ISP. Which one is the origin? The final one, gxn.net. Great! Now you have found the ISP. All you need to do now is search up the website of the ISP you identified and submit an abuse report and hope for the best. You can try using the Network Abuse Clearinghouse for a better chance of getting your message through. Make sure to include the significant bits of the email header HTML code to give the ISP a better idea of the spammer!

Visit the main author’s website at http://www.hkactivity.com

Tags: , , , , ,

Using Print Control Software to Manage Workflow

Print control has become an important part of almost any business. Now more than ever business owners are finding it necessary to cut costs by managing the printing that takes place. This does not mean that less material is printed, but rather printing is controlled so that unwanted documents aren’t turned out and materials wasted in the process.

Print control software is now being developed with the business owner in mind. Instead of employing an IT person to monitor the print jobs, the software that is available is not intuitive enough that it can be used by those without an IT background. This has significantly increased the level of productivity because it has opened up a host of options for the business owner. Now the IT person you have employed can spend time taking care of other computer-related tasks and you can monitor the output of all your print jobs.

Print control software is also easy to use, very cost effective and powerful enough to help you solve problems that occur all on your own.

Now you will have no problem controlling the printing of documents, spreadsheets and reports as well as invoices and bills. You can even control how much color is used for your various documents and will be given full monitoring capability for every printer on your specified network.

You will even have the option of backing up your print jobs or deleting them when they have been completed.

Print control software will offer you many robust features you may have never even known you needed and once employed, won’t be able to do without. When utilized, it will allow you to manage the amount of information that is printed from every computer on the specified network as well as obtain information from each computer where each print job was requested. This will not only provide you with a systematic way of monitoring your overall printing, but will also help you significantly cut costs by allowing you to eliminate unwanted print jobs before they are ever executed.

Print control software truly enables you to optimize your printing environment in a way that is now both possible and necessary. You will know what each of your employees are printing and how each printer is used. It will also save you time and money in the long run and allow you to concentrate on other important business-related activities.

Gary Null
Vancouver, British Columbia
Y6Z 1Y5 Canada
gary@czsolution.com
Tel:1-615-686-6232
Fax:1-615-704-7696
http://www.czsolution.com

CZ Solution has been developing innovative print management software solutions since 2003. Our mission is to provide easy-to-use print management software solutions for today’s complex printing environments. Our products help automate and simplify the administration of printing and reduce printing cost. Our core products are CZ Print Job Tracker and CZ Print Release Station.

Tags: , , , ,

The Advantages of Using Web Filters

The Internet is your window to the world. It allows you to learn about a particular place without having to visit it personally. Surfing the Web can also teach you a lot of things that can be useful to your day to day activities. From everyday news to something as mundane as the best ways to effectively clean your carpet, the Internet can provide you with all the information that you need with just a few clicks of the mouse. It is a good source of entertainment, too.

However, surfing the Internet may not be always good for people, especially to the children. Because hundreds of millions of people connect to the Web to exchange files and data, regulating web content is quite difficult. You could not exactly stop a particular person from uploading offensive materials on the Internet. Fortunately, there are programs that can help you block unwanted web sites that can be potentially harmful to the younger members of your family.

As the name implies, web filters are computer programs that allow you to screen and block web sites that you deem inappropriate. For instance, if you want your child to visit only educational sites, you can filter web pages that contain irrelevant materials and allow access only to those that has passed your criteria. By using such software, you can prevent your kid from stumbling upon web sites that contain offensive media and feature information that are not suited for his or her age.

We are all aware that most children are driven by their curiosity and most of them are more adept at surfing the Internet compared to their parents by the time they reach adolescence. While the Internet can be extremely helpful to their education, checking out the Web exposes them to various ideas and concepts that can pose risks to their mental and emotional development. However, if there are web filters installed in their computers, parents would be able to steer them away from web sites that can bring bad influence such as those that promote gambling, pornography, drug abuse, and violence.

Web filters can also help those people who have problems with compulsive shopping. Since the Internet makes it easy for many individuals to acquire their needs with just a click of a button, it is easier for shopping addicts to continue their destructive habits through online stores. But with web filters, you can block the web sites that fuel a certain person’s addiction to shopping.

One of the biggest advantages of installing web filters to you computer aside from blocking inappropriate online content is that it helps employees remain focused on their jobs. As we all know, many workers are tempted to surf the Internet for personal use even during office hours. Such a behavior is unacceptable because it can significantly affect productivity and exposed the computer network to unnecessary risks such as viruses and spywares. But by limiting their Internet access, employees would be discouraged from wasting their time on counter-productive practices.

Indeed, the Internet is a useful tool for many people. However, it is prone to abuse and can do more harm than good in some cases. Therefore, as a responsible surfer, do not upload materials that can be harmful to children and offensive to certain groups of people because there are parents like you who do not want their kids to see inappropriate web content.

Discover a new breakthrough in web filtering software that is completely leak proof unlike traditional content blocking software available. Get a FREE 7 day trial of the most advanced online filter on the market and keep your family safe. Randy is a christian husband and father who enjoys helping people understand how to leverage the power of the internet while providing a great tool to surf safely.

Tags: , , ,

Free Messengers

Messengers are a marvelous way of keeping in touch with friends, family and even colleagues at work. Free messengers are a feature offered by all the major web portals. You can share files and photographs, music and news with all those you have on your contact list. Instant messaging can be made fun as well by using smileys, cartoon characters, and wallpapers. In a word, your whole online world is easily contactable. The messengers commonly used are AOL’s AIM, Yahoo Instant Messenger, Windows Live Messenger, Google Messaging, and the ICQ. The new kid on the block is Digsby.

These messengers are easy to download and come with many features, not the least being that you can connect instantly with anyone who is on your contact list. You can send messages directly from your inbox and a record is kept so that in case you want to refer to a message, you can access it easily. Free messengers are a boon because they help you to contact even your business associates and partners instantly. In today’s world, time is of the essence and to keep pace with a swiftly moving world, communication has to be just as swift if not swifter.

When you are online and messaging your friend, another friend or contact can also join in either in your conversation, or you can carry on a separate conversation in another window. Neither is disturbed, and both work beautifully. Free messengers are developing and refining their features in such a way that not only are they offering a whole lot of special attractions, but they also make the whole thing very user-friendly. You can see new photographs that your friends have posted, and should your friend or friends be online at the same, time, you can even play a game together. This is really companionship in cyber world!

When you constantly update your status message, you are sharing the latest information with your friends and so, even if you cannot physically be with them, you will know all about what is happening with your friend, even as he or she keeps up-to-date with what is happening to and with you. Free messengers have become very dynamic tools of communication. Your whole group of friends will be in complete sync with each other. The free messenger service also helps in social causes. Through the Facebook or chat, or IM, you can contact a wide range of people and get their opinion on some current issue. This is far from being a passive experience.

Adam Keshier is an expert on internet messaging services and a big fan of Digsby.

Tags: , ,

Free Web Hosting with Yahoo! Geocities

Free Web Hosting on Yahoo!

Yahoo! Geocities’ free web hosting enables you to share your business or your personality with the world for free. “geocities.yahoo.com” provides an absolutely free package for web hosting. I think Yahoo! Geocities is the largest home page community on the web. Yahoo! Geocities provides you simple web designing tools such as Yahoo! PageWizards and Yahoo! PageBuilder. So you need not worry about learning Hyper Text Markup Language (HTML) for designing your web.

With Yahoo! PageWizards, you only need to answer a few questions and the Yahoo! PageWizards will create a professional looking web page for you in a few minutes. Yahoo! PageBuilder is a drag-and-drop editor that allows you to create a full featured web site very easily. For availing the Yahoo! Geocities’ free web hosting package service, one has to sign up with Yahoo! and this sign up process can be done absolutely free of cost.

If you already have an email address at Yahoo! , then you need not repeat the sign up process again. You will be getting your own Geocities web address – “www.geocities com/“.

Package Details for Free Web Hosting

The various features of this package are (1) Personalized web address (For example, “www.geocities.com/“), (2) Data transfer or Bandwidth up to 3 GB per month, (3) Storage space up to 15 MB for storing your web files, (4) Availability of free web designing tools such as Yahoo! PageBuilder and Yahoo! PageWizard, and (5) Free online help for customer support.

Yahoo! Geocities’ free web hosting package provides FrontPage Server Extensions and so one can design and publish web sites using Microsoft FrontPage 2000. You may design the pages of your site offline using MS-FrontPage 2000 and then you can upload your web files to a FTP server. While uploading various web files, you need to enter your Yahoo! ID and the Yahoo! password. You need to set one web page as “index.html” and this is the first page that will be loaded when your web address is called.

There is provision in the Yahoo! Geocities to set the page “index.html” as the web page to be loaded when your web address is called. After hosting your site on the Geocities, you can upload changed files to the Geocities server as and when required. If you are ready to spend a little money on your site, then you can go for your own domain name and then re-directing your domain name to your web address on the Geocities. Thus one may feel that you have got a paid web site on the Internet.

You can take as many as email addresses from Yahoo! and can increase your web space if needed.

Yahoo! Geocities – an User Friendly Approach for Free Web Hosting

Thus, Yahoo! Geocities provides a user friendly approach for free web hosting and thereby enables you to publish your site, resume, share family photos or connect with others who share your interests.

Tags: , , , ,

Purchasing Refurbished Laptops Make Sense

It’s perfectly normal to be a little apprehensive about purchasing a refurbished laptop. The thought of purchasing a product that is refurbished conjures up thoughts of a product that has been repainted, fixed up, and made to look new, but doesn’t perform like new. This is not the case when it comes to purchasing a refurbished laptop computer. Laptops that are refurbished are typically products that have been returned for repair, may have a minor defect that is repaired, or in some cases are actually new product that for marketing reasons are termed refurbished, to justify a lower price. Excess manufacturer inventory is sometime sold into a distribution network that re markets products and in some case labels them refurbished.

What about the reliability of refurbished laptops? Today’s modern electronic devices are very reliable, and in reality there are relatively few suppliers of the basic components of a laptop computer. Under the covers there is a great deal of commonality between brands, of the basic components i.e. keyboards, memory, hard drives. The testing method’s used to test a refurbished device and failure modes of the components inside a laptop are such that laptops that are sold as refurbished are as reliable as new product right off the assembly line. In fact an argument can be made that a refurbished laptop may be more reliable than the new products since it has passed through the “infant mortality” portion of it’s life where early failures often occur. A refurbished product has been “burned in” and the early failures eliminated.

What about price? Do some shopping and you will find that refurbished laptops can be found for 30% to 40% of new product price. This can amount to significant savings. In many cases the refurbished laptop may have larger memory and hard drive capacity to boot. In almost all cases the refurbished laptop will come with a warranty. Check this out before buying to make sure you are covered in case something goes wrong.

I wouldn’t hesitate a nanosecond on buying a rubbished laptop. I have been around the computer scene for many years, and I can tell you there is nothing to fear in buying a used laptop. In most case the documentation, packaging, and everything else that goes with the new product will be included with the refurbished model. Check the details of what is included before you buy.

Good luck as you search for that bargain refurbished laptop and enjoy many years of reliable mobile computing.

The author is a computer industry professional in the service and repair industry. His career dates back to the early 1960’s and the early solid state large scale super computers. He has managed services organizations responsible for service of large PC networks and manged repair center operations. He has served on service industry councils of IBM, HP and Compaq. His website http://www.finestlaptops.com is focused on providing information on, and sources for cheap laptop computers.

Tags: ,

Tips For Extending Laptop Battery Life

One of the most discussed aspects of owning a laptop and mobile computing, is how to get more operating time from the laptop battery. Everyone needs more time from the battery when they are traveling, or not able to have the laptop plugged into the AC outlet. It seems we always need more operating time than we can get from the battery, and it never fails that we are near the end of a critical task when the screen goes dim.

The first consideration when buying a new laptop, refurbished laptop, or a new replacement battery is to study the manual and the recommendation that the manufacturer has for initially charging and discharging the battery. The conditioning of the battery is important to its ultimate life and also allows the laptop to calibrate its charging status indicators with the battery. The process will vary depending on the battery technology and it is important that it be followed. The following are tips to follow to get more life and operating time from your battery:

Reduce LCD Display Brightness

Operate the display at the lowest brightness level that is comfortable for your eyes. The brightness of the LCD screen is one of the main components consuming significant power from the battery. Most laptop software combinations have control over the display brightness, and this will have more effect on battery time than any other factor. When operating from the AC brightness can be set at any level you want.

Minimize Optical Drive Use

An optical disk drive spinning with a CD or DVD inside consumes power even if you are not using the drive for programs. When not using the drive remove the media and you will save power.

Turn Off Optional Devices

Using WI FI is a drain on the battery. If you are not using WI FI turn it off and there will be less power consumption since WI FI circuitry even in seek mode consumes power. Remove any unused USB devices. The USB memory stick inserted but not being used is consuming a small amount of power, but when combined with other unused devices increases the power consumption.

Select Conservative Power Options

Go to the power options section of your software control panel and select the most conservative or power reducing option available. Select the “Hibernate” option rather than “standby” since hibernate actually shuts the laptop down and saves operating settings.

Increase the Amount of RAM

Increasing the amount of system RAM will reduce the number of hard drive accesses because more of the information is stored in memory instead of the hard drive. The reduction in disk activity decreases the power consumed. In addition to the power savings, increasing RAM is the single most significant step other than a CPU upgrade, that you can take to improve speed and performance of your laptop.

Take Care of the Battery

If you take care of the battery it will provide longer more reliable service. Remove the battery periodically and using a pencil eraser clean the contacts, and use a cloth or cotton swab moistened with rubbing alcohol to clean the battery contacts. Don’t leave the battery in the direct sunlight or store it where it will be subject to high temperatures. Heat is the enemy of anything electronic, and that includes your laptop battery. Depending on the type of battery your laptop uses you should charge and discharge the battery every two weeks. Check the operating manual to be sure of this procedure. You should not completely discharge a LI-ION technology battery since it doesn’t have the same “memory” effect as non LI-ION type batteries. Most new laptops use LI-ION batteries but check your manual to be sure of the correct care of the battery after periods of non use.

Following the simple steps outlined will go a long way towards getting more operating time from your laptop battery without hampering your laptop use.

The author is a computer industry professional in the service and repair industry. His career dates back to the early 1960’s and the early solid state large scale super computers. He has managed services organizations responsible for service of large PC networks and manged repair center operations. He has served on service industry councils of IBM, HP and Compaq. His website http://www.finestlaptops.com is focused on providing information on, and sources for new and refurbished laptop computers.

Tags: ,