Motorrad Navigator II GPS Navigation System

Owners of BMW motorcycles have a new technology available to them to provide up to the minute directions and navigation throughout all of Europe. BMW's latest GPS unit for their motorcycles is a huge step up from their previous model. This model features an upgraded memory chip, up to 2 GB from 512 MB. The model also comes with a road map covering all of Eastern Europe installed right out of the box. This is a great feature because prior to this model you would have to take the unit to your pc and download the appropriate maps onto the unit. With this model you simply have to mount the unit to your motorcycle and attach the battery cable and you are ready to take off on the road.

Riders will find the new touch screen a vast improvement over the previous model and it has been retuned for easier use with gloved hands. The unit has been rated for use in snow and in rain, and against extreme heat and cold. The units increased memory and processors allow for virtual instantaneous updates of information and position. As with the previous model it still provides the rider with elapsed time, estimated time to destination, current speed, average speed and top speed. This models positioning is extremely accurate as it pulls information from twelve different satellites when coordinating your position. Most GPS units only use the information of four satellites and this gives the BMW model a greater advantage at calculating your exact position on the globe.

As for drivers or riders of non-BMW bikes, this unit can be used with any vehicle or motorcycle and will require minimal mounting and wiring. For an automobile it comes equipped with a cigarette lighter plug and can be mounted fairly easily to most vehicles. Pedestrians can also use this unit with its battery powered option. This product is available at all BMW dealerships and online at the BMW website.


Top Tips for Fire Safety With the FM 200 Fire Suppression System

Fire safety has always held an unassuming nature; yet it yields decimating consequences should it be left unchecked and glaringly overlooked. One of the more well-acclaimed systems in the market, the FM 200 Fire Suppression System is imperative to the safety of any workplace, and proves to be a turning point in the effort towards environmentally responsible solutions.

There are two main facets attached to fire safety – workplace and home. No matter what type of business you conduct at your workplace, safety in all aspects should take priority. We all owe a duty of care and responsibility for the safety of ourselves and of others; it is something that should not be compromised for fear of imperiling those around us.

Learn what you can do to keep your workplace safe and prepared in the event of a fire outbreak.

  1. Keep your work area free of waste paper, trash or any other items that could potentially catch fire The littlest steps make the biggest difference, so start small and make conscientious efforts daily to ensure the safety of your surroundings in your work environment.
  2. Check your electrical cords regularlyWith continuous use over time, the condition of electrical cords can rapidly deteriorate, creating a potentially dangerous electric shock or fire hazard. Majority of electrical fires are a result of old or faulty wiring and cords, so be sure to check up on these electrical appliances regularly to prevent the occurrence of such fires.
  3. Test smoke alarms every month – It is easy to overlook “stale” and virtually untouched equipment – though for something concerning safety, it would be wise not to compromise such. Conduct regular tests to ensure the necessary equipment is in prime working condition. If the batteries to the smoke alarms are not functioning, be sure to replace them.
  4. Fire safety training for all employees – Some of the most invaluable courses you can equip both yourself and your subordinates with is that of fire safety training. Knowing where the emergency exits are and how to evacuate in an orderly manner is key in executing a successful and efficient fire emergency escape.
  5. Keep a ready supply of fire extinguishers close by, or better yet a fire suppression system – Associations strongly encourage workplaces to hold at least a few fire extinguishers in a designated compound. The potential for fire extinguishers to snuff out small-scale or early detected fires cannot be understated. However, for compounds such as offices, telecommunication facilities or control rooms, the traditional fire extinguishers just might not cut it. Owing to the operation of the fire extinguishers, residual remnants would be left behind after the fire is put out – which admittedly, is not ideal for spaces housing electrical equipment and key documents.

Here, the FM 200 Fire Suppression System is the most suitable agent for routinely occupied spaces such as offices or the general workplace. It is a revolutionary quick-response, waterless protection system that employs the use of a synthetic fire suppression gas to put out the fire by eliminating heat elements and free radicals.

With an already fully functioning and readily deployable system, the FM 200 Fire Suppression System proves to be the foremost solution for your fire protection needs. Contact a professional company for the installation of the leading fire protection system.


Ford Edge battery/Failing voltage regulator/charging system diagnostics on two 2011s

I recently purchased the SOLAR BA7 battery and charging system tester. (Link Below) I have been having battery issues with one 2011 Ford Edge Limited without remote start. The battery registered as weak and had some strange charging lights that I will have to work on and see if it is just the battery or if the issues are deeper than just a bad battery. The other 2011 Ford Edge limited with push button start and remote start had no issues and check out great. I also tested the battery on a 2011 Toyota mini van and it failed all the tests and registered as bad, which is what I thought it would do. It is the mini van for my church and was just helping out.

BA7 battery tester:


Build a SOLAR PANEL WINDOW AWNING Battery Charging System

Build a lightweight portable solar panel stand for a flexible solar panel that can be easily mounted to your RV window. I installed an external plug and I connect multiple flexible solar panels to an small MPPT charge controller with bluetooth monitoring. This setup is great to add more solar to your RV or use it as your primary solar charging system.


Note: The 1/2″ PVC pipe and fittings, stainless steel screws and washers were purchased at my local hardware store.




ALL OF OUR SOLAR GEAR in one place

#rvwithtito #rvsolardiy



The opinions expressed in our videos are our own or from a contributor. Before taking on any project or making a large purchase, we recommend you do your own research and consult a professional for advice. We are NOT liable for any damage to your RV or injury incurred as a result of following our tips, advice or instructions. We are not RV professionals or certified technicians. We are simply RV owners who work on our own RVs and have a desire to share what we learn with others. Be responsible and know your limits.

We often provide links to items featured in videos. These links may link to merchants with affilliate programs such as who may pay us a small commission on purchases you make. Using those links is a great way to support our videos.


Fixing Cub Cadet Charging System

We fix the charging system on our Cub Cadet RZT50 zero turn mower. The engine is a Kawasaki FR691V. Check out what we found and how easy it was to fix.




Computer Worm – What is Computer Worm and How to Safe-Guard Your System

If you have been using a computer for some time now, then you probably have heard about a computer worm. This is a type of "malware" or malware software. These worms have been around for a while now. A computer worm is like a virus because it will attach itself to a file, but unlike a virus, a worm is able to self-replicate and spread through your computer without any help from you. It will not only spread through all of your computer files, but it will also spread through your email too.

It is important to understand that the longer worm stays is in your computer, the more disruptions and damage it will be able to do therein. If you purchase anti virus software, you will also be able to protect yourself from a computer worm. While you will get a lot of protection from these anti virus programs, they are not able to provide you with complete protection.

For this reason you will also need to have a good fire wall in place. Then you will be able to keep criminals from getting into your computer in the first place. If you want to get the best protection though you will need to get a computer software protection suite. Of course, even then you are going to make sure that you have the latest updates available in order for you to be really safe.

So, why would anyone want to create such a thing? First of all, it is because these worms are able to bring down systems and networks since they are able to consume a lot of bandwidth and memory. Secondly, it will also be able to tunnel into your system. Once they are able to make their way into your email address book the worm can then be sent to everyone therein.

Keeping above information in view it is important to protect your system and data from dangerous computer worms. Absolutely important to have security software in place and have regular security updates installed on your system. The regular security update will help in stopping worms in penetrating in your system. Having closed the gaps around your system, next thing is being knowledgeable about latest worms and latest security updates available to counter them. The more you are pro-active in defending your system and data, the more you will have less chances of getting attacked by computer worm. Avoid opening unexpected mails, especially with attachments.

By opening these attachments you may be directed to suspected web links, which will enable them to download malicious programs on your system or capture your email contacts. They can also spread worm through your email contact address book. Stakes are high; keep your security plan robust. Starting with good security software, firewall followed by daily security updates. Keep regular backup of your system and avoid going to web sites, which give free stuff. Most of the time these sites will package spyware or adware along with free software. Use filtering tools in your email system to filter spam mails.

There is nothing called hundred percent protection from virus and worms, by applying above procedures you can minimize chances of worm attack on your system.


BGA Inspection System for BGA Soldering

BGAs are difficult to rework as they require a pretty deep knowledge of the original manufacturing process, knowledge of the chemistries involved in the original manufacturing process, the thermal profiles of the various processes as well as an experienced eye in terms of BGA inspection.

In terms of BGA inspection, while the IPC-A-610 standard indicates that the inspection of BGAs can be confirmed from a process standpoint via x-ray, it is imperative that the tools of visual inspection, endoscopic inspection, and x-ray be used for proper BGA inspection.

Visual BGA inspection on the edge of the BGA package and the geometries of the depiction is very limited and is a function of having access to a periphery of the device. Many times the operator will have to be able to articulate the board underneath the microscope. This also assumes that the edge of the board has not interfered with respect to the edges of the device.

Endoscopic inspection is similar in scope and in its limitations to the visual inspection process. The endoscopic mirror is placed in vicinity to the edge of the BGA so that BGA inspection can occur. The magnification of the inspection instrument is such that unlike optical inspection, the periphery of the BGA ball interface can be seen. The ball to package interface is important because this part of the BGA inspection can determine if the wetting of the ball to the package is sufficient. The interface of the ball to the PCB also determines what the solder joint of the ball to the board looks like. Here again, the inspector looks at the wetting of the interface of the ball to the board. What is particularly critical is the board corners. If collapse and ball shape are confirmed at the corners in the BGA inspection process then it is generally assumed that the rest of the ball interfaces will be acceptable.

X-ray inspection of BGAs gives the processor many details of the outcome of the BGA rework or original assembly process. Not only is the ball size and it’s uniformity a reflection of the consistency of the reflow process but other parameters can be determined from the x-ray. In addition to the ball collapse uniformity, any shorts can be pointed out through the examination of the x-ray image. The x-ray image in a BGA inspection process can also determine if anomalies such as the flowing of solder down the “dogbone” pattern of the contact to the via is disturbed.


Improving the Microwave System With ATPC

In microwave communications, a single transmission band is divided into a plurality of frequency channels, and a transmitter and a receiver are provided for each of the frequency channels. When the XPIC system is applied to microwave communications, a transmitter and a receiver are provided for each V-polarized wave and each H-polarized wave of each of the frequency channels.

In microwave communications, only one particular frequency channel sometimes suffers from a high transmission loss due to multipath fading or from some other cause. When there is the influence of deep fading, not only the S/N ratio of the particular frequency channel is deteriorated, but also interference from an adjacent frequency channel or channels is increased, resulting in deterioration in the quality of received signals. Therefore, an ATPC (Automatic Transmit Power Control) system has been developed which increases the transmit power only for a particular frequency channel which undergoes deep fading. The ATPC system is generally so constructed that, when a drop of the receive signal level or reception intensity on the reception side is detected, the information is transmitted to the transmission side by way of a control circuit or control line in the opposite direction, and on the transmission side, the transmitter is controlled so as to increase the transmit power. Naturally, when the influence of multipath fading disappears, the original transmit power is restored.

If the maximum transmit power in a ATPC system is needed for only a short period of time, a transmit power less than maximum may (if certain requirements are met) be used when interference calculations are made into other systems. On the other hand, because the maximum power is available when deep fades occur, C/I interference calculations into the ATPC system may assume the “maximum power” carrier level.

ATPC is a feedback control system that temporarily increases transmitter output power during periods of fading, thus eliminating (or at least reducing) the adverse effects of fade events on digital point-to-point microwave fixed services. ATPC offers immediate and long-term advantages over a fixed transmit power system:

* including reduced average power consumption,

* longer amplifier component life so extended equipment MTBF (Mean Time Between Failure),

* reduces interference affecting nearby systems,

* improves residual BER performance, and

* alleviates up-fade problem

An application of an ATPC system to an XPIC system is investigated. It is preferable to have ATPC operational (both direction) on the XPIC path. Since control is effected for each pair of transmitters and receivers in a conventional ATPC system, ATPC control is effected for the V-polarized wave and the H-polarized wave of the same frequency channel independently of each other an exemplary conventional ATPC system applied to an XPIC system. Click here for further detail.


Save Paper Work and Time With an Access Control System

The word access means to provide authorization to the user for any of the tasks. There is similar meaning in understanding the concept of access control systems. It states that providing authorizations to any individual for the shorter periods or longer periods of time becomes easier to manage and integrate accordingly. There is a need to manage and handle high levels of security so that time is saved, paper work is reduced and also operating and maintenance costs are reduced.

We often say that access control systems are the powerful systems that monitor even the smallest of the systems in the large buildings, organizations and institutions for better safety and reliability. With the use of these systems, the critical tasks can be monitored and handled very efficiently. There are some of the key benefits in regards with the access control systems:

1. It handles critical situations very smartly and rapidly responds to any of the security threats and issues around.

2. In case of any threat, the management receives immediate alarm notifications so that steps can be taken to prevent happening to occur.

3. These systems are installed quickly and saves lot of time.

4. It also saves a lot of paper work as records are automatically stored within the database and can be accessed any time to verify the records of the employees in the organization.

5. It provides flexibility in every type of environment and is thus trusted by most of the customers.

To implement the access control systems, we have 3 types of controls:

1. Physical Controls: It provides security and access to one's personal computer or the group of computers. Physical access control can be related to a human and the alternative systems provide the authority to the individual to work on its controls. Few examples of physical control include: Alarms, Lightning, Locks, Security guards, etc.

2. Logical Controls: These types of controls are used to restrict the access to systems for unauthorized users. It protects and limits the number of available resources. Logical controls are also known as technical controls. Some of the examples include: Routers, Encryption Software, Smart-Cards, Firewalls, Access Control Lists (ACLs), etc.

3. Administrative Controls: These are the controls that are handled under the supervision of management and administration with proper planning, structure, security awareness along with the list of policies and procedures. Few examples include: Testing, Job-rotations, investigations, etc.

Biometrics is one of the big examples of the access control systems in terms of network security, home security and others. If people are still using the old-fashioned methods of securing their data, systems, home, etc. they are decreasing the invention of technologies and extremely creating lots of problems for them. Access control systems open the doors to opportunity and provide security, protection and integrity to the available resources.


The Basic Solar System Part 2 – Components and Overview

This is part 2 in an 11 part series on your basic home solar system. This article covers the components of the system. The basic residential solar system is comprised of 7 important must have parts. These components are the mainstay of a solar system.

The Solar Panels are the number 1 component in our system. The solar panels convert the sun's energy into electricity. Solar panels come in wattage from 5 watts up to 250 watts in 18volts for a 12 volt system or 36 volts for a 24 volt system. Panels can be hooked up in series to increase the voltage or in parallel to increase the amount of amps or a combination of both.

The combiner box is the 2nd component to introduce to you. The combiner box does just what the name suggests. This box utilizes Dc circuit breakers to combine the multiple output leads of the solar panels and combines them into one positive and one negative wire that transfers the DC power to the Charge Controller.

As previously mentioned, the Charge Controller is the 3rd item in our assembly. This piece of equipment takes the power from the Solar Panels and utilizes it to recharge the batteries. The Charge Controller constantly monitors the voltage level of the batteries and feeds them the current required to keep them at their prescribed level.

The Batteries are the 4th component in the solar power system. The batteries are "Deep Cycle" batteries. They are designed to be subjected to numerous draw down and recharge cycles. These batteries are constructed with thicker plates than your everyday "Starting" Batteries. A good example of a Deep Cycle battery is the 27DC-6 Battery found in the automated section at Wal-Mart. Deep Cycle batteries can be found in 2 volts, 6 volts, 12 volts, 24 volts or 48 volts.

The 5th component in use is the DC Disconnect. The DC Disconnect is located between the battery bank and the Inverter. The DC Disconnect is used to disconnect (Turn Off) the direct current that is running from the batteries to the Inverter.

The 6th Component is the Inverter. The Inverter takes the DC current from the battery bank and transforms it into useable 120 volts. Inverters can be found in all sizes from 100 watt models up to 10,000 watt units. The Inverter's input voltage rating must match the voltage of the battery bank. IE.12volt, 24volt, 48volt, etc.

The 7th and last item is the AC Disconnect. The AC Disconnect is to be used to interrupt the AC power from streaming from the Inverter to the panel which distributes the loads.

The above components all work together in unison to take the light from the sun and turn it into clean, free electricity. There are no moving parts except the cooling fans on the inverters. These are the components needed to create your own Solar Power Plant. Is it cheap? No, but it is not overly expensive either. In part 3 we will discuss the storage aspect of this system, the Batteries. Till then Reduce, Reuse and Recycle and never settle for less.