Wednesday, October 30, 2013

Ashton Kutcher is Lenovo’s new Product Engineer


lenovo-kutcher

Ashton Kutcher is well known for the prankster show Punk’d, and the Fox sitcom That 70′s Show. The American actor, producer, model, and ex-husband of Demi Moore, has a fleet of accomplishments.  His latest is the new product engineer for Lenovo.

Ashton Kutcher enrolled at the University of Iowa in August 1996, planning to be a biochemical engineer.
He later pursued to be a model and signed with Next modeling agency in 1998, where he appeared in ads for Calvin Klein.

ashton-kutcher-lenovo

Kutcher’s modeling success drove his life into a new direction.

Even though Kutcher is currently staring in the CBS comedy Two and a Half Men, his relationship with Apple and Google landed him the new gig.

Kutcher played the title character of Steve Jobs in the movie Jobs, which may have had something to do with his new job.  I wonder if he’ll be pulling his famous pranks from Punk’d at Lenovo.
“Lenovo is all about innovation and strong leadership,” said Kutcher, co-founder of A-Grade Investments, which has invested in or worked with Airbnb, Foursquare, Spotify, Path, Uber and others.

Kutcher is also the face of Lenovo’s latest product, the Yoga Tablet.  A sleek new Android tablet , that comes in 8 and 10-inch with 18 hours of battery life.




 The Yoga Tablet has a cylindrical grip on the side that houses the battery with a convenient grip.  The cylinder also has an integrated stand that folds out to support the tablet in two modes.


Ashton Kutcher isn’t the first celebrity to be hired by a tech company.  Alicia Keys is the creative director for BlackBerry, Lady Gaga became the creative director for Polaroid, and Will.i.am emerged as Intel’s new director of creative innovation.

Although, Lenovo may be getting relevant expertise from Kutcher from his engineering background.  Kutcher will be helping with marketing, design specifications and software guidance for the brand’s upcoming projects.  Smart move on Lenovo’s part, if not anything, they now have a very famous face to their brand.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:
Ashton Kutcher: Lenovo’s new product engineer – Engadget
http://www.engadget.com/2013/10/29/ashton-kutcher-lenovo-new-product-engineer/
October 29, 2013

Ashton Kutcher joins Lenovo as product engineer – USA Today
http://www.usatoday.com/story/tech/2013/10/29/ashton-kutcher-joins-lenovo-as-newest-product-engineer/3306987/
October 29, 2013

Ashton Kutcher is now a Lenovo product engineer – The Verge
http://www.theverge.com/2013/10/30/5045782/ashton-kutcher-is-now-a-lenovo-product-engineer
October 30, 2013

Tuesday, October 29, 2013

Buffer App strengthens security becuase of spam.


buffer-hacked
http://www.hyphenet.com/blog/buffer-app-strengthens-security-becuase-spam./

bufferapp.com, a social sharing website that allows you to schedule posts on Facebook, Twitter and Google+, was attacked with spam on Saturday.  The attack was first noticed when a blast of spammy weight-loss links were added to users Facebook and Twitter pages.

If you opened up the links to the weight-loss sites, it is possible you may have opened your system to a bit a spam yourself.

It looks like Buffer blasted Facebook only with the weight-loss spam and nothing else, but sources are still indefinite.

Buffer has fixed the problem and upgraded their security to prevent the spam from happening again.

“We greatly apologize for this big mess we’ve created. Buffer has been hacked,” co-founder Leo Widrich said in a Facebook post on Saturday morning.

The Buffer App, said on Sunday it is encrypting OAuth access tokens.  This allows users to access other applications and will do so without revealing passwords.  Buffer also created a new security parameter to the API (applications programming interface) calls, making it nearly bullet-proof.

Buffer’s founder Joel Gascoigne wrote, “We have greatly increased security of how we are posting to Twitter and Facebook and have confidence to cover the security holes the hackers have used to break into our system.”

Facebook said 30,000 Buffer users were affected with the spam issues.  This is around 6.3 percent of the 476,343 Facebook accounts connected to Buffer.


When Buffer users go back to their accounts, they will need to reconnect to their Twitter accounts but not their Facebook ones.

The company continues to work on examining exactly what happened, including how the hackers managed to break into Buffer and just what, exactly, are the consequences from the spam.

Have you seen a trend in weight-loss sites in your Facebook?  Let us know your experience below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:
Buffer encrypts access tokens after spammer hack – CSO
http://www.cso.com.au/article/530175/buffer_encrypts_access_tokens_after_spammer_hack/
October 28, 2013
Schedule-Posting App Buffer Survives Spam Attack, Back Online – PC Magazine
http://www.pcmag.com/article2/0,2817,2426403,00.asp
October 27, 2013
Social Sharing App Buffer Hacked, Temporarily Halts Service – All Things D
http://allthingsd.com/20131026/social-sharing-app-buffer-hacked-temporarily-halts-service/

Monday, October 28, 2013

Play-i teaches children to program robots


A start-up  entrepreneur, Vikas Gupta has come up with a little robot that will teach your kids how to code.  Gupta, an engineer who works in Silicon Valley, worries his 2-year old daughter won’t have a suitable education in a wold run by technology.

Gupta grew up in India, and has seen the lack of development in programmers in our U.S. education system.
Bo_Xylophone_Play_i
http://www.hyphenet.com/blog/play-teaches-children-program-robots/

Gupta and other engineers with Google, Apple, and Frog Design, have formed Play-i, a programmable robot aimed at young children, to make learning how to program robots easy and fun.

The crafty engineers have launched a crowd-funding campaign aimed at raising $250,000.  If they meet their goal, the Play-i robots will be mass-produced for kids ages five and up.

The Vision

The idea behind Play-i is to teach kids how to string code together to create applications.  An iPad is needed to visually display the kid-friendly programming language.  By stringing together code commands through the iPad, kids can control movements and activities of the robot.

BoRacer_YanaCape-Play-i
http://www.hyphenet.com/blog/play-teaches-children-program-robots/

There are two character robots for the Play-i – Yana and Bo.  Yana, is a single robot “storyteller” that will cost $49.  Bo, “the teacher”, sits atop three other balls with wheels that will cost $149.
Yana and Bo will allow kids to manipulate lights, movement and sounds of the two robots.

Google Ventures put in $1 million to Gupta’s team of seven engineers early this year.  If you would like to help fund the project,  you can go to Play-i.com.  You can also reserve one of the Play-i robots to be a part of the test market.
It’s a tangible way for kids to get programming at a much younger age.” says Google Ventures partner Andy Wheeler. “Hopefully, within a few years they are expanding into retail and expanding the software and hardware components … to allow the toy to grow with the child.”
Hopefully the company will reach its goal of $250,000 in the next 30 days.  Do you think this is a good way for our children to keep up with technology today?  Watch the inspirational video below!




Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest Facebook scams.

Valley engineers want kids to program robots – USA Today
http://www.usatoday.com/story/tech/2013/10/28/valley-engineers-want-kids-to-program-robots/3197381/
October 28, 2013

Play-i looks to crowdfunding to teach kids to code – C|Net
http://news.cnet.com/8301-10797_3-57609596-235/play-i-looks-to-crowdfunding-to-teach-kids-to-code/
October 28, 2013

https://www.play-i.com/

Friday, October 25, 2013

Is this the end of the Mac enterprise?

Mac sales haven’t just dropped in the past couple years, they have fallen dramatically faster than the PC market as a whole.

Macs are not the most popular computers in the enterprise office either.  Yes people love their MacBook Airs and MacBook Pros, but with the price tag so high, CIOs pass on purchasing them for the office. 
High-tech offices love Macs, thanks to the Adobe Creative Suite/Creative Cloud, but Apple lacks security updates for older versions of the Mac OS X.

Apple just announced that Mac OS X 10.9, Mavericks has fixed many security bugs for the older versions.




Apple stopped releasing their security flaws for older operating systems because with a rise in zero day attacks were prevailing itself.

The tall tale of the Mac having no security issues is exposed: ever hear of the Flashback Trojan, Icefog, or Backdoor:OSX/KitM.A?  These are all successful Mac malware programs.  If you are using a Mac, you should download Mavericks today!

Mavericks is a free software, it may take a couple hours to download the multi-Gigabyte to update and install but its worth it!

For those still using OS X Mountain Lion, you know there’s no more security updates, right?

Advanced Technologies

OS X Mavericks boosts performance and found a way to increase battery life efficiency.

hero_icon
http://www.hyphenet.com/blog/end-mac-enterprise/

Timer Coalescing – groups low-level operations together, allowing idle time for your CPU to enter a low-power state.  The CPU uses less energy reducing the activity up to 72%.

App Nap – the OS X can tell what apps you are actually working on putting a rest period on all apps that are behind other windows or hidden.

Safari Power Saver – turns animations off from advertisements or motion graphics strolling onto your screen.  This feature recognizes the difference between what you came to see and the stuff you didn’t.

iTunes HD Playback Efficiency – OS X Mavericks improves the energy efficiency of iTunes video playback.  The video playback takes advantage of your graphics hardware saving your CPU 35% of energy.

Compressed Memory - OS X Mavericks compresses data from inactive apps, making memory more available.  Compressing and decompressing happens instantaneously, Mavericks helps with responsive timing.


mavericks-compression
http://www.hyphenet.com/blog/end-mac-enterprise/


Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest Facebook scams.

References:

Mavericks: The end of Macs in the enterprise? – ZDNet
http://www.zdnet.com/mavericks-the-end-of-macs-in-the-enterprise-7000022410/
October 24, 2013

The end of the Mac? – MacDailyNews
http://macdailynews.com/2013/10/15/the-end-of-the-mac/
October 15, 2013

OS X Mavericks – Apple
http://www.apple.com/osx/

This is how Indonesia tops the charts for malicious traffic.

Last week, We Live Security confirmed Indonesia topped China in cyber-attacks.  In the second quarter of 2013, Indonesia almost doubled its traffic filled with attacks from 21% to 38% of the entire world.

Between China and Indonesia, they account for almost half the attack traffic in the world; with China generating 33%

.internet-cafe-indonesia
http://www.hyphenet.com/blog/indonesia-tops-charts-malicious-traffic./

According to PC World, attacks have been rapidly increasing with 89% of attacks, compared to 56% in the fourth quarter of 2012.

Could it be a misunderstanding?

Does it seem strange that Indonesia accounted for only 1% of global attacks last year and now are #1 in the world with an increase of 125%?  Akamai, an internet content delivery network, reported:
“The attack traffic in the State of the Internet report is based on traffic received on servers sitting on unadvertised IP space. Since there is no legitimate reason for a system to be making a connection to those IP addresses, all traffic coming to them is considered to be malicious at some level.”
Automated scans may be picking up potentially malware infected computers from Internet cafes and shared networks.

indonesia-malwarehttp://www.hyphenet.com/blog/indonesia-tops-charts-malicious-traffic./

The main factor for the rise in malicious traffic is likely due to the recent growth of Internet usage.  From 2011 to 2012, an increase of 10 million started using the internet, that is 800,000 users a month.  Its predicted that there will be 80 million Indonesian users by the end of 2013.

Compared to the United States, that's still miniscule, only 15% of Americans do not use the internet.

The Security Risk

With almost half of Indonesia's internet users connecting from an Internet cafe, the risk level is significant.  Users are not able to protect themselves on the internet seeing the computer isn't theirs.  Cafe owners may not see the value of investing in security for their computer yet.

Most users access the internet for the same reasons Americans do: Google, Facebook, YouTube, and Twitter.

In 2011, 86% of internet users in Indonesia were using pirated software.  Compared to the global rate of 42% and 19% in the United States.  Many software companies will not provide software updates to unregistered software, so they are full of unpatched vulnerabilities.

Indonesia_map 

Nine out of ten Indonesian internet users have pirated software and just about two-thirds of their computers have malware.  This gives come clarity in the reason why Indonesia is #1 for malicious traffic.  You can say China is  still #1 because malicious traffic coming from their has been confirmed cyber criminals.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:
Is this how Indonesia topped the malicious traffic charts? - We Live Security
http://www.welivesecurity.com/2013/10/23/is-this-how-indonesia-topped-the-malicious-traffic-charts/
Oct. 23, 2013

Indonesia overtakes China as leading source of cyberattacks, Akamai reports - We Live Security
http://www.welivesecurity.com/2013/10/17/indonesia-overtakes-china-as-leading-source-of-cyberattacks-akamai-reports/
Oct. 17, 2013

Indonesia Tops China as Cyber Attack Capital - PC Magazine
http://www.pcmag.com/article2/0,2817,2425836,00.asp

Monday, October 21, 2013

Find out how to break your PC bad habits




 
There are many risks on the internet for those using “free software”, online games, and downloadable movies or music.  Cybercriminals are hacking into licensed software, games, and pirated films through your PC.

Not to fear, there are small changes we can make  to keep ourselves safer when using the web.  Here are some steps to take to avoid being a victim of hackers and identity theft.

Use a free VPN service to protect your Wi-Fi connections
By using a free VPN service when connecting to Wi-Fi access, you can secure your connection from lurking snoops.  SecurityKISS VPN is a easy service to use with free registration.

Disable images in your e-mail
By disabling images coming through your e-mail, you will prevent the HTML beacons used by cybercriminals to be activated.  If images are not disabled, your location via the IP address can not be read that discloses your general location.

Don’t promote yourself to “admin”
If your login doesn’t have “Administrator” privileges, it will reduce the likelihood of self-installing malware.  Create a multi-user account for everyday use instead.

Keep your browser clean
By not personalizing your browser, you can keep cybercrinimals from coming through.  Don’t store passwords in your browser or download dubious plug-ins.  Several plug-ins have been detected as being weak in security and a target for cybercriminals.

Pay attention to the pop-up boxes
The little warning pop ups are important to pay attention to.  Be sure to update your computer manually instead of clicking on the link advised.  The source code for Adobe Acrobat’s document software has recently been stolen.  So make sure you have a good antivirus running software.

Watch your friends
Don’t befriend people you don’t know on Facebook.  Also, keep your settings to Friends only, NOT Friends of Friends because then you are making yourself susceptible to intrusion.

Create “unbreakable” passwords
Never use email addresses or simple passwords for your accounts.  Any password can and will be decrypted.  Cybercriminals are hacking internet giants such as Adobe, make sure your passwords are complicated with variation of upper case, lower case, punctuation, symbols, and numerals.  Click here for help on creating a strong password that’s easy for you to remember.

Be sure to follow us @hyphenet“like” us or circle us to stay up-to-date on the latest tech news and security threats.

Did you know? Hyphenet offers virus removal services to help you get your PC back to normal. Give us a call at (619) 325-0990. 

References:

Five bad PC habits many of us STILL have – and how to stop today – We Live Security
http://www.welivesecurity.com/2013/10/11/five-bad-pc-habits-many-of-us-still-have-and-how-to-stop-today/
Oct. 11, 2013

How to secure your PC in 10 easy steps – C|Net
http://howto.cnet.com/8301-11310_39-57324404-285/how-to-secure-your-pc-in-10-easy-steps/

Friday, October 18, 2013

25 Years of Microsoft Windows

n the 1970′s two computer enthusiasts, Bill Gates and Paul Allen changed the future of personal computing forever.  Microsoft, a software we use on a daily basis, began small but as a huge vision and began to change the way we work.

IBM approaches Microsoft about a project named “Chess”.  Microsoft starts to focus on a new operating system that not only manages computer hardware but serves as a bridge for the hardware and programs.  The new operating system became MS-DOS.

Windows is always evolving, Microsoft Windows XP will not continue any support as of April 14, 2014. 

With the continued use of Windows XP, your computer might become more vulnerable to security risks and viruses.  Contact us at 619-325-0990 or support@hyphenet.com for information on upgrades.










 

  

 



Here are some “Geek Trivia” provided by Microsoft Windows:
  1. MS‑DOS stands for Microsoft Disk Operating System.
  2. Remember floppy disks and kilobytes? Windows 1.0 requires a minimum of 256 kilobytes (KB), two double-sided floppy disk drives, and a graphics adapter card. A hard disk and 512 KB memory is recommended for running multiple programs or when using DOS 3.0 or higher.
  3. Control Panel makes its first appearance in Windows 2.0.
  4. The group that develops Windows NT was originally called the “Portable Systems” team.
  5. In 1996, Microsoft releases Flight Simulator for Windows 95—the first time in its 14-year history that it’s available for Windows.
  6. Technically speaking, Windows Me was the last Microsoft operating system to be based on the Windows 95 code base. Microsoft announced that all future operating system products would be based on the Windows NT and Windows 2000 kernel.
  7. The nightly stress test performed on Windows 2000 during development is the equivalent of three months of run time on up to 1,500 computers.
  8. Windows XP is compiled from 45 million lines of code.
  9. More than 1.5 million devices are compatible with Windows Vista at launch.
  10. Windows 7 was evaluated by 8 million beta testers worldwide before it was released.
  11. Power users will notice that Windows 8 has made the detection and correction of file system errors both more transparent and less intrusive.
Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest computer security threats.
What do you think about the evolution of Microsoft Windows?  Please leave your comments below!

References:
Windows 8.1 – C|Net
http://news.cnet.com/2300-11386_3-10018608-13.html
A history of Windows Highlights from the first 25 years – Microsoft Windows
http://windows.microsoft.com/en-us/windows/history

Thursday, October 17, 2013

Should This be a Time for Security Concern for the Smartwatch?

As we advance in electronics, the smartwatch is gaining popularity with techies.

Inspired by the success of smartphones and tablets, more compact computer chips, sensors, and touch screens bear the new generation of smartwatches.  Smartwatches  are meant to offer another means to check information.

A device used for viewing social media updates, check the weather, and connect to your calendar  all conveniently placed on your wrist.

The devices have huge potential but they don’t always equally compare to the smartphone.  The smartwatch is still vulnerable to hacks and other cyber attacks from untrusted apps.

Smartwatch wearers have concern with embedded apps that are vulnerable to code-based attacks.  As with any device connected to installed platforms, defense protection is required.  Also, banging around your mini computer on your wrist may cause glitches to the accessory.

Dozens of smartwatches are in development focusing on firmware and software updates.

Here are the top rating smartwatches in 2013:

The Pebble Smartwatch


pebble 
The Pebble Smartwatch is the favorite of all smartwatches. The Pebble connects wirelessly to your iPhone or Android device. It also tracks your bike ride or jog and controls music.  Not to mention a week long battery life.

Martian Smartwatch

martain-passport 
The Martian Smartwatch is the most elegant of the smartwatches available. The Martian Smartwatch has hands-free voice commands, message and alert display, and smartphone camera control. This smartwatch doesn’t look like a computer on your wrist like others.

i’m Watch Smartwatch

imwatch-smartwatch 
The i’m Watch is sleek, modern, and Italian.  The i’m Watch is lacking in firmware and software, although the next few updates should take care of this problem.  The price on this watch is a little steep considering the battery life is less than a day.

Sony Smartwatch 2 SW2

sony-smartwatch-2sw2 
The newest addition from Sony, and a rehash of the original Sony Smartwatch1. If this watch were not limited to only Android phones, it would rank higher within the smartwatches.  This watch is a great price but lacks in battery life.

MetaWatch Strata

metawatch-strata 
The Metawatch Strata smartwatch comes in different colors and designs while their technology is still developing. Features like calender and email notifications are coming soon.

Eco-Drive Proximity

citizen-proximity 
The Citizen Eco-Drive Proximity is only compatible with iOS systems. The battery on this smartwatch gives you an impressive 1095 days of life! This is a handsome chronograph watch, with a 24-hour dial, second time zone, and Bluetooth 4.0 radio.

Cookoo Smartwatch

cookoo-smartwatch 
The Cookoo Smartwatch is simple and not cluttered with features. The Cookoo is designed to be an extension of the wear’s smartphone. Unlike other smartwatch’s, the Cookoo doesn’t need to be recharged.

Do you have a smartwatch?  What do you think about it? Give us your feedback below!

References:

Top 5 Smart Watches 2013 – Smart Watch News
http://www.smartwatchnews.org/top-5-smart-watches/

Watches That Can Kick Your Phone’s Butt – Boston Magazine
http://www.bostonmagazine.com/home-design/blog/2013/03/12/watches-that-can-kick-your-phones-butt/

Compare Smartwatches – Find The Best
http://smartwatches.findthebest.com/

Wednesday, October 16, 2013

The First Computer Programmer Was a Woman?

Ada Lovelace Day

Augusta Ada Lovelace, the “enchantress of numbers” wrote the first computer program in 1842.  Computer Science is a field heavily populated with male professionals.  Women have been known to shy away from computer science professions as the media portrays computer scientists as geeky, socially awkward, and unattractive.

So today, being Ada Lovelace Day, highlights women in science technology, engineering and math;which is hugely dominated by men.  Ada Lovelace, daughter of Lord Byron, the poet, was split from her mother shortly after her birth.

Being the first tech visionary, her mother encouraged her to peruse math and her poet father encouraged her to be creative.  This conjured up the first programmer.
“Lovelace is an unusual example of a woman for her time because she was not only allowed to learn mathematics but encouraged to learn mathematics,” Aurora said. “She shows what women can do when given a chance.”
Ada called herself ” an Analyst(&Metaphysician)” in which she understood the befit of combining functionality and complexity to her developments. Soon to be  responsible for computer software, artificial intelligence and computer music.

Computer science involves highly technical, engineering, and mathematical skills.

Women make up only 27% of computer occupations which is  a drop from 34% in 1990.  Although, the first computer programmer was a woman, women use the internet for social gains.

agusta-ada-lovelace
http://www.hyphenet.com/blog/first-computer-programmer-woman/

Females look at computers for benefits in social status, while men view computers as a tool.

With the computer science field heavily populated with men, the thought of pursuing education in the field may be intimidating to most women.  It is well known in society that men make more money than women in professional fields.

According to the College Board, 2,594 girls and 12,068 boys took the AP computer Science A exam in 2011, and 517 girls and 4,422 boys took the advanced AP Computer Science AB exam.  Both girls and boys scored an average of the same on their test scores.

When girls are told they are not as good on the subject, it is found they score 32% less on the exams.

Benefits of Gender Diversity

More women in the computer science industry has its advantages.

From a IT industry’s standpoint, gender diversity is beneficial giving innovative ideas when group-thinking.  Gender diverse groups help businesses to produce better decision making skills, increase creativity, and innovative performances.

When a group becomes homogenized, it hinders groupthink and stagnates the workforce.

There is a perception among women, their male peers, and professors  would see them as needing “extra help” to get through their course.  What is not realized, while women may sometimes need extra help getting functions of computer science down, they are gaining access to peer networks more readily available then male students.

Women can be just as technical as men, but they also require advocacy to be happy in their career.  Women feel alone and at a loss in technical fields because of the lack of networks and mentors.  People that work in the technical field often work alone just as a computer stands alone.  When their is no support system, women decline in talent and opportunities in career advancement.  Women that are provided with support needed from a team or company, are promoted to more senior rolls and become major players in advancement and senior tech roles.

ada_lovelaces_197th_birthday-991005-hp 

As we look back on the first computer programmer being a woman, changing our lives to the means in which we live today.  We still hold this perception of women not fitting into the computer scientist world.  It is women and society that holds them back, here is a fantastic Infographic showing just how perceptions disguise how successful women can be in the innovative world of computer science.


how-girls-hold-themselves-back-from-pursuing-computer-science-infographic_521d090625dad


What are your thoughts on women in the computer industry?  We would love to hear from you! Please leave your comments below.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

A Day to Remember the First Computer Programmer Was a Woman – NY Times
http://bits.blogs.nytimes.com/2013/10/15/a-day-to-remember-the-first-computer-programmer-was-a-woman/?ref=technology&_r=0
October 15, 2013

Why Aren’t Women Interested in Computer Science? – The Wall Street Journal
http://blogs.wsj.com/economics/2013/09/25/why-arent-women-interested-in-computer-science/
October 16, 2013

Why Are Girls Not Pursuing Computer Science Degrees? – Edudemic
http://www.edudemic.com/girls-computer-science-degrees/

Monday, October 14, 2013

Buy of the Week: Dell Multifunction Color Laser Printer C1765nf for only $255 plus tax!

Dell_Multifunction_Color_Printer_C1765nf
http://www.hyphenet.com/blog/buy-week-dell-multifunction-color-laser-printer-c1765nf-255-plus-tax/

Easy-to-use and affordable, with multifunction versatility

Multitask with ease:
Print, scan, copy and fax with one affordable easy-to-use device. The C1765nf multifunction color printer adds versatility and value to your office.
  • Multitask with ease: Print, scan, copy and fax with one cost-effective, efficient and space-saving device.
  • Print from mobile devices: Print directly from AndroidTM  mobile devices with Dell Mobile Print app1 or from iOS mobile devices with Mobile Print App1 for Dell.
  • Share over a network: Share your multifunction printer over a small network with built-in Ethernet, plus share digitized content easily with included Nuance PaperPort v14 software.
  • Windows®  8 compatible
Main Specifications
Product Description Dell Multifunction Color Printer C1765nf – multifunction printer ( color )
Device Type Fax / Copier / Printer / Scanner
Copier Type Digital
Fax Type G3 – plain paper
Printing Technology LED ( color )
Monthly Duty Cycle (max) 30000 impressions
Max Copying Speed Up to 15 ppm (mono) / up to 12 ppm (color)
Max Printing Speed Up to 15 ppm (mono) / up to 12 ppm (color)
Max Printing Resolution Up to 600 x 600 dpi (mono) / up to 600 x 600 dpi (color)
Max Fax Transmission Speed 33.6 Kbps
Scanning 1200 x 1200 dpi
Original Size Legal (8.5 in x 14 in) (max)
Original Type Sheets
Document Feeder Capacity 15 sheets
Media Size Legal (216 x 356 mm) (max)
Media Type Envelopes, plain paper, labels, recycled paper, coated paper
Standard Media Capacity 160 sheets
Bypass Feeder Capacity 10 sheets
Output Trays Capacity 100 sheets
PC Connection Availability Yes
PC Connection USB 2.0, LAN
Office Machine Features Save to USB flash drive, scan to e-mail, scan to application, scan to network
Power AC 120 V ( 50/60Hz )
Dimensions (WxDxH) 16.1 in x 14.9 in x 13.3 in
Weight 34.2 lbs
Microsoft Certification Compatible with Windows 7
Environmental Standards ENERGY STAR Qualified

Extended Specifications
General
Device Type Fax / copier / printer / scanner
Copier Type Digital
Fax Type Plain paper
Printing Technology LED – color
Monthly Duty Cycle (max) 30000 impressions
Display 4 lines
Office Machine Features Save to USB flash drive, scan to e-mail, scan to application, scan to network
Memory
Standard Memory 128 MB
Copying
Max Copying Speed Up to 15 ppm (mono) / up to 12 ppm (color)
Max Document Enlargement 400%
Max Document Reduction 25%
Maximum Copies 99
Exposure Modes Text, photo, text and photo
Printing
Max Printing Resolution Up to 600 x 600 dpi (mono) / up to 600 x 600 dpi (color)
Max Printing Speed Up to 15 ppm (mono) / up to 12 ppm (color)
Printer Drivers / Emulations Windows GDI driver
Scanning
Optical Resolution 1200 x 1200 dpi
Interpolated Resolution 4800 x 4800 dpi
Gray Scale Depth 8 bit
Color Depth 24 bit
Fax Machine
Compatibility G3
Max Transmission Speed 33.6 Kbps
Fax Machine Features
Speed Dialing 99 station(s)
Broadcast Transmission Yes
Delayed Transmission Yes
Remote Fax Retrieval (Polling) Yes
Features Distinctive Ring Pattern Detection (DRPD)
Document & Media Handling
Max Original Size Legal (8.5 in x 14 in)
Original Type Sheets
Document Feeder Capacity 15 sheets
Max Media Size Legal
Supported Media Type Envelopes, plain paper, labels, recycled paper, coated paper
Supported Media Sizes Letter A Size (8.5 in x 11 in), Legal (8.5 in x 14 in), Executive (7.25 in x 10.5 in), A4 (8.25 in x 11.7 in), A5 (5.83 in x 8.25 in), B5 (6.93 in x 9.83 in), Folio (8.5 in x 13 in), C5 (6.38 in x 9 in)
Standard Media Capacity 160 sheets
Bypass Feeder Capacity 10 sheets
Output Trays Capacity 100 sheets
Document & Media Handling Details Input tray – 150 sheets – Legal (8.5 in x 14 in) weight: 60 g/m2 – 163 g/m2
Bypass tray – 10 sheets
ADF – 15 sheets – Legal (8.5 in x 14 in)
Speed Details Printing : up to 15 ppm ( Letter A ) – B/W
Printing : up to 12 ppm ( Letter A ) – color
Copying : up to 15 ppm ( Letter A ) – B/W
Copying : up to 12 ppm ( Letter A ) – color
Connections
PC Connection Availability Yes
Interfaces USB 2.0
LAN
Operating System Support MS Windows XP, MS Windows Server 2003, MS Windows Server 2008 x64 Edition, Apple Mac OS X 10.5, MS Windows 7, MS Windows 7 64-bit Edition, MS Windows Vista, MS Windows XP 64-bit Edition, MS Windows Server 2003 x64 Edition, MS Windows Vista (64-bit versions), Apple Mac OS X 10.4.11 or later, MS Windows Server 2008, Apple Mac OS X 10.6, MS Windows Server 2008 R2, Apple Mac OS X 10.7, Windows 8, Windows 8 64-bit
Software Included Drivers & utilities, Dell Toner Management System, Dell Printer Configuration Web Tool, Dell OpenManage Printer Manager, Nuance PaperPort 14
Power
Voltage Required AC 120 V ( 50/60Hz )
Power Consumption Operational 280 Watt
Power Consumption Standby 40 Watt
Power Consumption Sleep 10 Watt
Miscellaneous
First Copy Out Time B/W 24 sec
First Copy Out Time Color 40 sec
Consumables Included 1 x cartridge ( black ) – up to 700 pages
1 x cartridge ( cyan ) – up to 700 pages
1 x cartridge ( yellow ) – up to 700 pages
1 x cartridge ( magenta ) – up to 700 pages
Compatible with Windows 7 “Compatible with Windows 7″ software and devices carry Microsoft’s assurance that these products have passed tests for compatibility and reliability with 32-bit and 64-bit Windows 7.
Compliant Standards RoHS
Environmental Standards
ENERGY STAR Qualified Yes
Dimensions & Weight
Width 16.1 in
Depth 14.9 in
Height 13.3 in
Weight 34.2 lbs
Dimensions & Weight (Shipping)
Shipping Width 22.1 in
Shipping Depth 20.9 in
Shipping Height 19.9 in
Shipping Weight 40.3 lbs

Don’t miss out on this Buy of the Week! Call (619) 325-0990 to order your Dell Multifunction Color Laser Printer C1765nf today!

Buy of the Week offer valid through October 18, 2013.
* Shipping and taxes apply.