|Lighting the Perfect Computer⁠

This blog post is part of a series on my experience building the perfect computer, where I cover the various decisions and research that I did as I figured out how to best setup my lighting.

The Corsair Commander Pro is great because it allows you to control two lighting channels, six fans, and it also has 2 USB headers, which are great for adding additional Lighting Pro Nodes to have extra channels. There are four temperature sensors, but these seem pretty pointless since you can use the sensors built into your motherboard (for CPU, GPU, etc.) to control your fan speed, which seems like a much better option adhering the temperature sensor to somewhere random.

I ultimately went with the six Corsair QL120 RGB Fans. Each three-pack comes with a Lighting Node Core, which you'll need to run the fans. Each fan has a Corsair RGB Connector and a Fan Connector. The built quality of the QL120s is excellent, albeit not quite as good as the beQuiet fans that I had tried initially).

UV Lighting⁠⁠

One thing that was not clear to me in the beginning, was how to get my components to glow. 

The gist is that you need a UV Light (also known as a Black Light) inside your case. Traditionally, this has meant putting a Cold Cathode Light in your computer. These work great and are inexpensive, but I couldn't find any that were super high-quality and require a little box to go inside your PC somewhere.

Alternatively, you can get LED UV Lights. These aren't as bright as Cold Cathode Lights, but you can line them up in rows to add as much light as you need – I ended up putting four of the LEDdess PC UV Lights. Note that most UV Lights are just always on; they cannot be addressed individually like your other RGB LEDs.

Note: UV Light gives off a faint purplish color that is in the visible light spectrum. Many manufacturers will call their UV Light "UV Purple" when what they mean is that it is just a plain black light.

Another option is CableMod's WideBeam Hybrid UV LED; these are brighter than the LEDdess UV, but not by a lot. They are also a lot wider and cannot be controller by your computer (unless you have a Gigabyte Motherboard compatible with 5-pint RGBs).

Comments

To add a comment, please login or register.

Related

What to Say to the C-Level, get your security project funded today!
In near every business adding costs to Information Systems will be seen, by the people running the business, as a cost first, benefit second. Remarkably this still holds true despite a constant pulse of security events hitting the C-Level desks. So let's, as security professionals, develop an understanding of the C-Suite and the C-Levels as to their priorities.
C-Level Security: Bank security and the egg timer (how good management trumps technology)
The development of technology for securing information has been advancing at a pace that is truly astounding. In 20 years the security industry has evolved from Sun Micro Systems' Sunscreen and the Cisco PIX (yes I know there were a few others) to over a thousand security products of which nearly 700 are currently VC funded. All are trying to generate business from within this ever advancing market currently called Cyber Security. There are few tech markets growing at the rate of Cyber Security and as a result we are seeing investors, in a near desperate attempt to gather slivers of this market, throwing money at companies with Rube-Goldberg-inspired technology. We now have a flood of technology solutions that no one person can understand and the customers that consume this technology struggle daily with supporting and operating these systems. Many of the C-Level executives reading this may want to consider a management solution for the next expensive problem your engineering team presents to you.
C-Level: Fan Boy, XEB
In 1999 I was extremely busy. I had just started a company, my second, in the Network Security field which was new and unknown. Sales were slow, hacking was deep, deep inside campuses like Stanford and MIT and was considered sport. I was getting traction with banks and was in SF for a meeting. I remember walking down Mission past a guitar shop and hearing this song, guitar was hitting the tonic breaking into cool background riffs, a little vocal falsetto opening then breaking into verse…..broken and then back…..WTF. Reminiscent of a Cello piece I know……..inspired….. I stopped dead in my tracks - stunned. Who are these guys!?!
C-Level Security: When your team uses military analogies, are they using the wrong narrative?
For years, I have bristled when people would use medieval military descriptions in an attempt to convey concepts within the Network Security business. Bastions, Firewalls, Moats, Drawbridges, Countermeasures; all of these descriptions give way to a more accurate and detailed explanation of what was really taking place.