Shopping Cart
Shopping Cart (0)

AMAZE TECHNOLOGY

 
3,700.00 BDT
13,000.00 BDT
3,300.00 BDT
12,000.00 BDT
6,500.00 BDT
11,000.00 BDT
12,500.00 BDT
9,100.00 BDT
7,200.00 BDT
63,700.00 BDT
38,600.00 BDT
699.00 BDT
250.00 BDT
350.00 BDT
600.00 BDT
3,700.00 BDT
2,150.00 BDT
2,150.00 BDT
3,300.00 BDT

Wholesale Only

Processor Intel Core i5 10th Generation

Description

6 Cores & 12 Threads

2.9 GHz Clock Speed

4.3 GHz Maximum Turbo Frequency

LGA 1200 Socket

12MB Cache Memory

Dual-Channel DDR4-2666 Memory

Supports Intel Optane Memory

Supports 16 PCIe 3.0 Lanes

10th Generation (Comet Lake)

 

Please be aware that all the products are subjected to availability.

 

Please Call for Quantity & Price.

RAM 8GB Single DDR4 2666MHz Desktop

Description

Model: 8GB Single DDR4 2666MHz

Capacity: 8GB

CAS Latency: CL19

Memory Rank: Single Rank

PIN: 288-pin

8GB DDR4 2666MHz Desktop RAM has a distinguished and sophisticated heat spreader design with embodies the panther’s claws on the top. It also owns meticulously screened ICs, optimized stability and compatibility while playing in the heavy workload games. The memory module supports XMP 2.0, consuming low voltage.

 

Please be aware that all the products are subjected to availability.

 

Please Call for Quantity & Price.

Wholesale Only

Wholesale Only

RAM 16GB 3200MHz DDR4 Desktop 

The brand-new DDR4 memory module product with its only 1.2 working voltage, saves 20% of power compared to the last generation. This desktop RAM featured with 1.2 V memory module, Massive 32 GB Kit capacity. It completely compatible with X99 chipset. Therefore, the heat generated from the product itself has also been reduced, and it can maintain the peripheral operating temperature around the system. This desktop RAM also featured with 25,600 MB/s (PC4 25600) Data Transfer Bandwidth. The product shows perfect compliance with the specifications of JEDEC, and it has 100% product compatibility as well as quality reliability with INTEL's latest X99 chipset. Both single-channel and dual-channel are available at the same time so as to meet the demands of users at different levels. 

 

Please be aware that all the products are subjected to availability.

 

Please Call for Quantity & Price.

Did you know ?

 

  • The First Computer Weighed More Than 27 Tons, Her name was ENIAC, and she took up a modest 1800 square feet of space.

 

  • As of June 2020 the most powerful computer in the world is the Japanese supercomputer Fugaku, developed by Riken and Fujitsu. It has been used to model COVID-19 simulations.

 

  • Doug Engelbart invented the first computer mouse in around 1964 which was made of wood.

 

  • Some of the Biggest Computer Brands Started in Garages. This is true for Apple, Microsoft, and HP.

 

  • The First Known Computer Programmer was a Woman, Her name was Ada Lovelace, and she lived in England, where she worked as a mathematician and writer. She is famous for working on the “Analytical Engine.”

 

  • People Blink Less When They Use Computers. While the average person blinks about 20 times a minute under normal circumstances, people on computers only blink about seven times a minute.

 

  • Hackers Write About 6,000 New Viruses Each Month, These viruses are designed to target a wide selection of operating systems, so learning to avoid viruses and malware is essential!

 

  • About 70% of Virus Engineers Work for Organized Crime Syndicates, This gives new weight to the importance of anti-virus and anti-malware software, and excellent virus removal services.

 

  • The Parts for the Modern Computer Were First Invented in 1833, A man named Charles Babbage put them together, but the first modern computer came about 120 years later.

 

  • The first 1GB hard disk drive was announced in 1980 which weighed about 550 pounds, and had a price tag of $40, 000.!

 

  • Russia Engineered a Computer That Ran on Water, The computer was built in 1936 and was meant to solve partial differential equations.Computers Might Soon be Able to Tell What Dogs Think,These computers are under development by a Scandinavian company. A prototype is purported to be available.

 

  • MIT Has Computers That can Detect Fake SmilesThese computers can tell between genuine smiles and frustrated smiles.

 

  • TYPEWRITER is the longest word that you can write using the letters only on one row of the keyboard of your computer

 

  • If there was a computer as powerful as the human brain, it would be able to do 38 thousand trillion operations per second and hold more than 3580 terabytes of memory.

 

  • The original name of windows was Interface Manager.

 

  • The first microprocessor created by Intel was the 4004. It was designed for a calculator, and in that time nobody imagined where it would lead.

 

 

        Computer,

device for processing, storing, and displaying information:

 

The first computers were used primarily for numerical calculations. However, as any information can be numerically encoded, people soon realized that computers are capable of general-purpose information processing. Their capacity to handle large amounts of data has extended the range and accuracy of weather forecasting. Their speed has allowed them to make decisions about routing telephone connections through a network and to control mechanical systems such as automobiles, nuclear reactors, and robotic surgical tools. They are also cheap enough to be embedded in everyday appliances and to make clothes dryers and rice cookers “smart.” Computers have allowed us to pose and answer questions that could not be pursued before. These questions might be about DNA sequences in genes, patterns of activity in a consumer market, or all the uses of a word in texts that have been stored in a database. Increasingly, computers can also learn and adapt as they operate.

 

Computers also have limitations, some of which are theoretical. For example, there are undecidable propositions whose truth cannot be determined within a given set of rules, such as the logical structure of a computer. Because no universal algorithmic method can exist to identify such propositions, a computer asked to obtain the truth of such a proposition will (unless forcibly interrupted) continue indefinitely—a condition known as the “halting problem.” (See Turing machine.) Other limitations reflect current technology. Human minds are skilled at recognizing spatial patterns—easily distinguishing among human faces, for instance—but this is a difficult task for computers, which must process information sequentially, rather than grasping details overall at a glance. Another problematic area for computers involves natural language interactions. Because so much common knowledge and contextual information is assumed in ordinary human communication, researchers have yet to solve the problem of providing relevant information to general-purpose natural language programs.

 

Analog computers:

Analog computers use continuous physical magnitudes to represent quantitative information. At first they represented quantities with mechanical components (see differential analyzer and integrator), but after World War II voltages were used; by the 1960s digital computers had largely replaced them. Nonetheless, analog computers, and some hybrid digital-analog systems, continued in use through the 1960s in tasks such as aircraft and spaceflight simulation.

 

One advantage of analog computation is that it may be relatively simple to design and build an analog computer to solve a single problem. Another advantage is that analog computers can frequently represent and solve a problem in “real time”; that is, the computation proceeds at the same rate as the system being modeled by it. Their main disadvantages are that analog representations are limited in precision—typically a few decimal places but fewer in complex mechanisms—and general-purpose devices are expensive and not easily programmed.

 

Digital computers:

In contrast to analog computers, digital computers represent information in discrete form, generally as sequences of 0s and 1s (binary digits, or bits). The modern era of digital computers began in the late 1930s and early 1940s in the United States, Britain, and Germany. The first devices used switches operated by electromagnets (relays). Their programs were stored on punched paper tape or cards, and they had limited internal data storage. For historical developments, see the section Invention of the modern computer.

 

Mainframe computer:

During the 1950s and ’60s, Unisys (maker of the UNIVAC computer), International Business Machines Corporation (IBM), and other companies made large, expensive computers of increasing power. They were used by major corporations and government research laboratories, typically as the sole computer in the organization. In 1959 the IBM 1401 computer rented for $8,000 per month (early IBM machines were almost always leased rather than sold), and in 1964 the largest IBM S/360 computer cost several million dollars.

These computers came to be called mainframes, though the term did not become common until smaller computers were built. Mainframe computers were characterized by having (for their time) large storage capabilities, fast components, and powerful computational abilities. They were highly reliable, and, because they frequently served vital needs in an organization, they were sometimes designed with redundant components that let them survive partial failures. Because they were complex systems, they were operated by a staff of systems programmers, who alone had access to the computer. Other users submitted “batch jobs” to be run one at a time on the mainframe.

Such systems remain important today, though they are no longer the sole, or even primary, central computing resource of an organization, which will typically have hundreds or thousands of personal computers (PCs). Mainframes now provide high-capacity data storage for Internet servers, or, through time-sharing techniques, they allow hundreds or thousands of users to run programs simultaneously. Because of their current roles, these computers are now called servers rather than mainframes.

 

Supercomputer:

The most powerful computers of the day have typically been called supercomputers. They have historically been very expensive and their use limited to high-priority computations for government-sponsored research, such as nuclear simulations and weather modeling. Today many of the computational techniques of early supercomputers are in common use in PCs. On the other hand, the design of costly, special-purpose processors for supercomputers has been supplanted by the use of large arrays of commodity processors (from several dozen to over 8,000) operating in parallel over a high-speed communications network.

 

Minicomputer:

Although minicomputers date to the early 1950s, the term was introduced in the mid-1960s. Relatively small and inexpensive, minicomputers were typically used in a single department of an organization and often dedicated to one task or shared by a small group. Minicomputers generally had limited computational power, but they had excellent compatibility with various laboratory and industrial devices for collecting and inputting data.

One of the most important manufacturers of minicomputers was Digital Equipment Corporation (DEC) with its Programmed Data Processor (PDP). In 1960 DEC’s PDP-1 sold for $120,000. Five years later its PDP-8 cost $18,000 and became the first widely used minicomputer, with more than 50,000 sold. The DEC PDP-11, introduced in 1970, came in a variety of models, small and cheap enough to control a single manufacturing process and large enough for shared use in university computer centres; more than 650,000 were sold. However, the microcomputer overtook this market in the 1980s.

 

Microcomputer:

A microcomputer is a small computer built around a microprocessor integrated circuit, or chip. Whereas the early minicomputers replaced vacuum tubes with discrete transistors, microcomputers (and later minicomputers as well) used microprocessors that integrated thousands or millions of transistors on a single chip. In 1971 the Intel Corporation produced the first microprocessor, the Intel 4004, which was powerful enough to function as a computer although it was produced for use in a Japanese-made calculator. In 1975 the first personal computer, the Altair, used a successor chip, the Intel 8080 microprocessor. Like minicomputers, early microcomputers had relatively limited storage and data-handling capabilities, but these have grown as storage technology has improved alongside processing power.In the 1980s it was common to distinguish between microprocessor-based scientific workstations and personal computers. The former used the most powerful microprocessors available and had high-performance colour graphics capabilities costing thousands of dollars. They were used by scientists for computation and data visualization and by engineers for computer-aided engineering. Today the distinction between workstation and PC has virtually vanished, with PCs having the power and display capability of workstations.

 

Embedded processors:

Another class of computer is the embedded processor. These are small computers that use simple microprocessors to control electrical and mechanical functions. They generally do not have to do elaborate computations or be extremely fast, nor do they have to have great “input-output” capability, and so they can be inexpensive. Embedded processors help to control aircraft and industrial automation, and they are common in automobiles and in both large and small household appliances. One particular type, the digital signal processor (DSP), has become as prevalent as the microprocessor. DSPs are used in wireless telephones, digital telephone and cable modems, and some stereo equipment.

 

Computer hardware:

The physical elements of a computer, its hardware, are generally divided into the central processing unit (CPU), main memory (or random-access memory, RAM), and peripherals. The last class encompasses all sorts of input and output (I/O) devices: keyboard, display monitor, printer, disk drives, network connections, scanners, and more.

The CPU and RAM are integrated circuits (ICs)—small silicon wafers, or chips, that contain thousands or millions of transistors that function as electrical switches. In 1965 Gordon Moore, one of the founders of Intel, stated what has become known as Moore’s law: the number of transistors on a chip doubles about every 18 months. Moore suggested that financial constraints would soon cause his law to break down, but it has been remarkably accurate for far longer than he first envisioned. It now appears that technical constraints may finally invalidate Moore’s law, since sometime between 2010 and 2020 transistors would have to consist of only a few atoms each, at which point the laws of quantum physics imply that they would cease to function reliably.

 

 

Safety Tips

 

         Your computer holds a wealth of personal and business data. If this information falls into the wrong hands, you may become open to identity theft, fraud, and             other types of cyber mischief. It's important to stay diligent about viruses, malware, phishing attacks, Trojan horses, and other online scams. Here's a review of           eight basic computer safety tips to safeguard your money, identity, and personal information.

 

  • Use Antivirus Software and Keep It Up-To-Date

    Antivirus software is a basic necessity in computing today and is essential to a secure system. There's no excuse for not having antivirus software installed on your system. In addition to paid applications, a host of free antivirus products work well and protect your vital data.

    Antivirus software and spyware scanners look for viruses, malware, and other malicious content, scanning your computer, emails, and downloaded files. Most antivirus software can be configured to scan files automatically and to check for new definition updates daily, taking the guesswork out of protecting your system.

 

  • Install Security Patches

    New vulnerabilities are constantly discovered in software applications and hardware devices. Hackers take advantage of these vulnerabilities to gain access to your computer and data.To stay ahead of the bad guys, keep your computer system updated by installing any available security patches and keeping browsers up to date. If you have a Windows system, Windows Update checks for and applies any available updates to the operating system and associated files.

 

  • Use a Firewall

    A firewall is a layer of protection between your computer and the internet. It acts as a barrier that monitors incoming data and uses security rules to determine whether or not that data is received by your computer.

    Windows has a built-in firewall that's enabled by default. There's also a host of free firewall programs that may serve your needs.

 

  • Never Provide Sensitive, Personal Information

    It's wise to be wary of giving out your personal information. Don't reveal your mother's maiden name, your Social Security number, or your address. Also, avoid mentioning these kinds of things on social media. Identity thieves and other criminals troll social media to gather information.

    Instead of providing your credit card information when you shop online, use a service such as PayPal. Your credit card and financial information are guarded on a single website, rather than on multiple sites.

 

  • Take Control of Your Email

    Never open an unexpected email attachment, no matter who appears to have sent it. Attackers spoof a sender’s name to fool people into opening attachments that collect personal information and forward it to the attacker. 

    Malicious content also hides in email messages that use HTML or Rich Text. Read your email in plain text for added security.

 

  • Treat IMs Suspiciously

    Instant messaging is a frequent target of worms and Trojans. Scammers continuously work on new ways to get personal information and gain access to personal accounts. Treat IMs just as warily as you would email.

 

  • Use Strong Passwords

    Use a variety of letters, numbers, and special characters in your passwords, and the longer and more complicated, the better. Use different passwords for each account. If an account supports it, use two-factor authentication.

    To get a handle on your passwords, consider using a password manager application. Many web browsers, such as Chrome and Opera, save passwords if this feature is enabled. Third-party apps, such as LastPass, are also helpful. These act as browser plug-ins that monitor password entries and save credentials for each account. All you need to remember is the single password you created for the manager program.

 

  • Keep Abreast of Internet Scams

    Don't open or click links in emails that tell sad stories, make unsolicited job offers, or promise lotto winnings. Also, beware of emails that masquerade as security concerns from your bank or another e-commerce site. These emails may contain links to malicious content. If you're not sure if an email from your bank or credit card company is legitimate, contact them directly.

 

Say you're in a library, a school or an airport, using a public computer to catch up on email or the news. Here are some simple steps to follow to protect yourself from potential predators:

 

  • Be Mindful of Policies - Be aware of the policies and rules regarding public computer usage at this site. They are usually posted somewhere nearby, viewable on the desktop, or available at a Help Desk. They should specify your access rights to the computer and what type of usage is considered inappropriate.

 

  • Beware Portable drives - Be careful using flash and other portable devices in public computers. Software exists that can load data to and from drives automatically when they are plugged in, siphoning your personal information. Drives containing personal or work data should especially not be used.

 

  • Watch for Shoulder Surfing - This is the method employed by passersby watching what you are doing while using a computer -- like typing in usernames and passwords. Always take a second to glance around briefly before typing in any personal information. Notebook Privacy Filters are another solution.

 

  • Remember the Keyloggers - These are programs that record your key strokes, or everything you type into the computer. They can very easily be loaded on public computers by other users and checked at a later time, without the computer owner even knowing. For this reason the use of credit card numbers or important login information should be avoided on public computers.

 

  • Clean out Your Files - Both before and after using a public computer, you should clean out the temporary internet files, history, caches, cookies and recycling bin. It is also important to clean out existing cookies before you start using the computer, so your computer usage is not recorded.

 

  • Carry Your own Applications - Your personal software can be carried around and used from a portable drive, including Internet browsers, instant messengers and word processing programs. This reduces the amount of information stored on the computer, though it should still be cleaned. PortableApps.com offers a wide variety of everyday software and it's free. But again be mindful of tip #2. Apps are one thing; personal information quite another.

 

  • Seek out a VPN - Using a Virtual Private Network to connect to work computers or networks is safe, even from public computers. All the data traveling to and from your work system is encrypted and cannot be packet sniffed by predators. Now, re: using your own computer at a public wireless location

 

  • Watch out for Wireless Sniffing - Others in the area may be watching your traffic to get usernames and passwords. Banking and other sensitive web business should not be done until work or home access is available.

 

  • Again, Respect the Policies - Be respectful when using wireless hotspots since someone else is paying for your usage. Do not download music or videos illegally or view inappropriate websites. This is to avoid trouble and to ensure the owner of the hotspot won't be forced to shut it down.

 

  • Keep Your Eyes on the Prize - Unattended laptops can disappear very quickly from airports, cafes or hotel rooms. Always keep your laptop in a locked bag or drawer when possible. Cable locks, alarms and ID tags are always a good idea. Newer technologies such as biometric IDs and linking to your cell phone via Blue Tooth will lock out unknown users. If your laptop is ever stolen, you may also get it back using Absolute Software's LoJack.

 

 

 

 

 

Since 2001 we are about to empower your technology. AMAZE TECHNOLOGY currently is a Bangladesh based Computer accessories & PC supplier/shopping service provider. Our main prospect is to provide high level of shopping experience to our honorable customers where reasonable price are guaranteed. We believe in unlimited opportunity, are committed to our customers. We have long time continuous customer service & technology experience what would help us to grow up & continue with good reputation. As a significant part of our business policy we are willing to deal with some specific well reputed accessories manufacturer/supplier of the world where quality comes first. We want to provide high standard accessories with updated technology to our customers.

Our product line includes:

Computer systems (desktops, workstations, appliances, LAN Stations & Servers with a full set of services concerning investigation, development, installation, maintenance of LAN & WAN);

Notebooks and handhelds with a full range of accessories;

Printing and multifunction - printers, faxes, copiers, all-in-one/multifunction machines, print servers and network software, large-format printers and plotters;

Digital imaging and audio - scanners, digital projectors, digital audio devices.

Storage - HDD, SDD, USB flasdrive, CD, DVD etc.

IIf you have any comments, suggestion please feel free to inform us through our contact us page. We are always appreciating your valuable suggestion.

yOur advice

About us

Name  
E-mail  
Mobile No  
Message  
  

Address:

ICT Bhaban

116, New Elephant Road

Dhaka- 1205

Bangladesh.

 

Phone:
+88 01989876400
E-mail: admin@tooptop.com

 

Contacts