Speaker System Installation Denver CO
A really successful one-box surround speaker system
Published on August 10, 2006
Yamaha YSP-1000 Digital Sound Projector Speaker System
Maximum Output Power: 2W (1 kHz, 10% THD, 4 Ω) x 40
Small dia. speakers: 1.25" x 40
Woofers: 4.5" x 2
Audio VCR, TV/STB (analog) - 2 analog pairs
Audio AUX, TV/STB (optical) - 2 digital
Audio DVD (coaxial) - 1 digital
Composite Video, VCR, DVD/AUX, STB - 3
Component Video, DVD/AUX, STB - 2 pairs
Subwoofer (1.5v, less than 120 Hz) - 1 subwoofer
Video (75 Ω) - 1 composite
Component Video (Y/Pb/Pr, 75 Ω each)
System Connector Jacks:
Optimizer Mic - 1 mic input
RS-232C - 1 system control
Remote In - 1 system control
IR-Out - 1 system control
Power Consumption: 50W
Standby Consumption: .1W or less
Dimensions: 40.6" x 7.6" x 4.6"
Weight: 28.7 lbs.
Yamaha Electronics Inc.
6660 Orangethorpe Ave.
Buena Park, CA 90620
No one would disagree that the home theater and surround sound areas of home electronics have become 100% more complicated and confusing than two-channel audio ever was. The average Joe may be impressed by a store home theater demonstration, but is probably not going to go to the trouble of purchasing six separate speaker enclosures, setting them up properly and wiring them to his receiver or amplifiers. Then there are the space and decor criteria which many small homes and apartment cannot spare to have invaded by a large family of loudspeakers and all their wiring. There have been a number of circuit technologies which are designed to process both two-channel audio and multichannel options such as Dolby Digital and DTS, giving them a surround effect when sitting directly in front of a pair of closely-spaced stereo speakers. Some have been used in the built-in audio systems of TV sets and displays. But most suffer from phasiness in some planes, and seldom can image sounds actually behind the listener.
What the Digital Sound Projector Does
Yamaha has succeeded in offering a single-box surround speaker system of quite high performance, designed to easily integrate with a home video display - especially flat screens mounted on the wall or in a corner of a room. The clean industrial design of the "sound bar" fits well into many different situations - its 40-inch length looking especially smart directly under a 50 or 60-inch wall-mounted flat screen. The Digital Sound Projector is an audio preamp and processor which handles both analog and digital inputs. It uses a total of 40 small speakers, each with its own 2.5 watt digital amp, plus 2 larger woofers powered by 20 watt amps. [See illustration] All the speakers are used for all the different "beam steering" options processed by the proprietary processing technology. The user has the option, using the ...
|Securing Your Wireless Network||
Securing Your Wireless Network
Increasingly, computer users interested in convenience and mobility are accessing the Internet wirelessly. Today, business travelers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on holiday; and shoppers place orders from the comfort of their couches. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network’s range.
Going wireless generally requires a broadband Internet connection into your home, called an “access point,” like a cable or DSL line that runs into a modem. To set up the wireless network, you connect the access point to a wireless router that broadcasts a signal through the air, sometimes as far as several hundred feet. Any computer within range that’s equipped with a wireless client card can pull the signal from the air and gain access to the Internet.
The downside of a wireless network is that, unless you take certain precautions, anyone with a wireless-ready computer can use your network. That means your neighbors, or even hackers lurking nearby, could “piggyback” on your network, or even access the information on your computer. And if an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account.
Fortunately, there are steps you can take to protect your wireless network and the computers on it.
1. Use encryption. The most effective way to secure your wireless network from intruders is to encrypt, or scramble, communications over the network. Most wireless routers, access points, and base stations have a built-in encryption mechanism. If your wireless router doesn’t have an encryption feature, consider getting one that does.
Manufacturers often deliver wireless routers with the encryption feature turned off. You must turn it on. The directions that come with your wireless router should explain how to do that. If they don’t, check the router manufacturer’s website.
Two main types of encryption are available: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). Your computer, router, and other equipment must use the same encryption. WPA is stronger; use it if you have a choice. It should protect you against most hackers.
Some older routers use only WEP encryption, which is better than no encryption. It should protect your wireless network against accidental intrusions by neighbors or attacks by less-sophisticated hackers. If you use WEP encryption, set it to the highest security level available.
2. Use anti-virus and anti-spyware software, and a firewall. Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the “off” mode, turn it on.
3. Turn off identifier broadcasting. Most wireless routers have a mechanism called identifier broadcasting. It sends out a signal to any device in the vicinity announcing its presence. You don’t need to broadcast this information if the person using the network already knows it is there. Hackers can use identifier broadcasting to home in on vulnerable wireless networks. Disable the identifier broadcasting mechanism if your wireless router allows it.
4. Change the identifier on your router from the default. The identifier for your router is likely to be a standard, default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world, hackers know the default IDs and can use them to try to access your network. Change your identifier to something only you know, and remember to configure the same unique ID into your wireless router and your computer so they can communicate. Use a password that’s at least 10 characters long: The longer your password, the harder it is for hackers to break.
5. Change your router’s pre-set password for administration. The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack.
6. Allow only specific computers to access your wireless network. Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. Some hackers have mimicked MAC addresses, so don’t rely on this step alone.
7. Turn off your wireless network when you know you won’t use it. Hackers cannot access a wireless router when it is shut down. If you turn the router off when you’re not using it, you limit the amount of time that it is susceptible to a hack.
8. Don’t assume that public “hot spots” are secure. Many cafés, hotels, airports, and other public establishments offer wireless networks for their customers’ use. These “hot spots” are convenient, but they may not be secure. Ask the proprietor what security measures are in place.
Be careful about the information you access or send from a public wireless network. To be on the safe side, you may want to assume that other people can access any information you see or send over a public wireless network. Unless you can verify that a hot spot has effective security measures in place, it may be best to avoid sending or receiving sensitive information over that network.
Encryption: The scrambling of data into a secret code that can be read only by software set to decode the information.
Extended Service Set Identifier (ESSID): The name a manufacturer assigns to a router. It may be a standard, default name assigned by the manufacturer to all hardware of that model. Users can improve security by changing to a unique name. Similar to a Service Set Identifier (SSID).
Firewall: Hardware or software designed to keep hackers from using your computer to send personal information without your permission. Firewalls watch for outside attempts to access your system and block communications to and from sources you don’t permit.
Media Access Control (MAC) Address: A unique number that the manufacturer assigns to each computer or other device in a network.
Router: A device that connects two or more networks. A router finds the best path for forwarding information across the networks.
Wired Equivalent Privacy (WEP): A security protocol that encrypts data sent to and from wireless devices within a network. Not as strong as WPA encryption.
Wi-Fi Protected Access (WPA): A security protocol developed to fix flaws in WEP. Encrypts data sent to and from wireless devices within a network.
Wireless Network: A method of connecting a computer to other computers or to the Internet without linking them by cables.
The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint or get free information on consumer issues , visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. Watch a new video, How to File a Complaint , at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network , a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
Dates: 5/20/2013 - 5/24/2013
Location: JW Marriot Cherry Creek
Battery Power Conference
Dates: 6/6/2013 - 6/7/2013
CEDIA Expo 2013 - Custom Electronic Design & Installation Association
Dates: 9/24/2013 - 9/27/2013
Location: Colorado Convention Center
700 14th Street
CEDIA Expo 2013 - Custom Electronic Design & Installation Association
Dates: 9/25/2013 - 9/28/2013
CEDIA - Custom Electronic Design & Installation Association
Dates: 9/25/2013 - 9/28/2013