Showing posts with label Information and Technology. Show all posts
Showing posts with label Information and Technology. Show all posts

Monday, October 12, 2009

New Laptop for Gamers from MSI


The new GX700 Extreme Edition is expected to be a revolution in the field of gaming laptops. As LAN gaming events become more popular every day, this is also a great opportunity for the gamers to show off their hardware equipment. The Taiwanian producer MSI took this into consideration too when he decided to produce and launch the
GX700.

When you see the coloured arrow keys printed on the WASD key, the typical first person shooters' most used keys, you can deny no more the fact that this laptop is definitely a potential attraction for big gamers. With a unique aesthetic design, GX700 is something to keep your eyes on for more than just a few seconds. A tattoo-like flame motif designed on a laptop is not something you see every day.

GX700 has also an independent numeric keypad and it still weights only 3.4 kg with the battery in place. And it has plenty of power to offer. With a 2.2GHZ Core 2 T7500 processor, a 250GB hard drive and a 17-inch widescreen TFT, GX 700 should be any gamer's dream. Not to mention the 512MB GeForce 8600 GT graphics card with HDMI output or the 2GB of DDR2 RAM.

Some say the 8600 graphics card is not exactly a great choice, as it has proven to be not particularly quick in tests, especially when it comes to high resolutions. But anyway the chip should be able to play DirectX 9 games at reasonable configuration.

The proposed UK price of 1099 should be a good backup in case the optimistic opinions stated by MSI representatives on the GX 700 prove to be wrong. They have claimed that the GX 700 "will forever change the stereotyped perceptions of notebook". So far, for the UK price of 1099, GX 700 looks like quite a good deal.

source : Softpedia

Tuesday, June 16, 2009

BlankOn Linux version 5.0 Official coast


Developer BlankOn official BlankOn launched version 5.0 with the release Nanggar, a culture that was on this version is from the Batak culture, the name "Nanggar" taken from the Batak language that has meaning "Hammer".

Some typical features of the new brought Nanggar including Desktop Berkonteks developed by Tim BlankOn Developers, who are able to change themes and background pictures desktop computers or the appropriate hour weather conditions that are applicable at that time.

Other special features on BlankOn Nanggar edition is the latest project Aksara archipelago that presents the ability to write and publish the text in Toba Batak script. To follow the project Aksara Nusantara please follow this link.

BlankOn Nanggar the guide book includes the full use can be found through this link. This book can also enjoy your straight on the system that was installed on the Sample folder.

Saturday, June 13, 2009

Blackberry technology


With the Blackberry technology, receive and send email as receive and send SMS. Plus several other advantages. Anytime, anywhere, easily and quickly. That demand, especially from the wireless access communication data. Any new technology-berbondong crowd present to meet the various charges. One Blackberry. Results of Rim (Research In Motion), a company engaged in the service of innovative technology solutions for wireless communications.

A prominent feature of this Blackberry is always on fusion facilities and pish based. Always on means the handset will be connected to the network. Well, when this condition has been reached then the data information can be sent based pish that is sent automatically to the handset without any request.

In fact this Blackberry can send and receive various data. Blackberry at this time but more used to access email. Is Keunggulanya email alerts on the handset. Each incoming email there will be no notification. During this time to know the incoming email must open the inbox. Now, with the Blackberry does not need anymore.

Blackberry technology is provided to the individuals and companies, Blackberry Enterprise Server software will be integrated with information systems company. In the software features available Mobile Data Service (MDS) is able to access data and company email accounts via a wireless handset and the always-on push-based. Which the handset should also support features available with the Blackberry application. Development Tools, such as browsers and other. So the company employees can access and manage corporate data whenever and wherever.

What about security?
Calm, Blackberry Enterprise Server is using the Advanced Encryption Standard (AES). If the handset is lost or stolen then the IT companies wireless can be secure with a password to lock the handset, or can even delete important data stored in the handset.

For individuals, provide software Rim Blackberry Web Client. An email interface that can be integrated with various email accounts. Email account will be added to the handset. Thus, users can still access the email account that is owned through a handset. Whether to open, delete, or change their email reply. Read the file attachment is also possible in the format Microsoft Word, Excel, Power Point, Corel and Adobe.

Hendset synchronization between the PC can also be made. Origin, PC already installed Blackberry Desktop software. The benefits, users can set how many emails can be received at the handset. Data can also email the backups in the PC.

In general, data processing email sent someone akan received by the server from the email account ago Blackberry Enterprise Server mengcopynya. Previous compressed and encrypted before it automatically. Email is then sent and the routing through the Internet network to the GPRS network operator owned. New to the handset receiver. So until akan di-dekompreasi and in-deenkripsi. Bars akan sounds alert and ready to read. The same process occurs apbila a company that mengimplemetasikan Blackberry wish to send the data to push servants.

Currently, the technology Blacberry already implemented in 50 networks in over 30 countries. Some vendors have also been working together as One Palm, Nokia, Sony Ericsson, Motorola and Siemens last. For Sony Ericsson Blackberry technology already found in the P900 series.

Wednesday, October 15, 2008

google chrome

At Google, we have a saying: “launch early and iterate.” While this approach is usually limited to our engineers, it apparently applies to our mailroom as well! As you may have read in the blogosphere, we hit "send" a bit early on a comic book introducing our new open source browser, Google Chrome. As we believe in access to information for everyone, we've now made the comic publicly available -- you can find it here. We will be launching the beta version of Google Chrome tomorrow in more than 100 countries.

So why are we launching Google Chrome? Because we believe we can add value for users and, at the same time, help drive innovation on the web.

All of us at Google spend much of our time working inside a browser. We search, chat, email and collaborate in a browser. And in our spare time, we shop, bank, read news and keep in touch with friends -- all using a browser. Because we spend so much time online, we began seriously thinking about what kind of browser could exist if we started from scratch and built on the best elements out there. We realized that the web had evolved from mainly simple text pages to rich, interactive applications and that we needed to completely rethink the browser. What we really needed was not just a browser, but also a modern platform for web pages and applications, and that's what we set out to build.

On the surface, we designed a browser window that is streamlined and simple. To most people, it isn't the browser that matters. It's only a tool to run the important stuff -- the pages, sites and applications that make up the web. Like the classic Google homepage, Google Chrome is clean and fast. It gets out of your way and gets you where you want to go.

Under the hood, we were able to build the foundation of a browser that runs today's complex web applications much better. By keeping each tab in an isolated "sandbox", we were able to prevent one tab from crashing another and provide improved protection from rogue sites. We improved speed and responsiveness across the board. We also built a more powerful JavaScript engine, V8, to power the next generation of web applications that aren't even possible in today's browsers.

This is just the beginning -- Google Chrome is far from done. We're releasing this beta for Windows to start the broader discussion and hear from you as quickly as possible. We're hard at work building versions for Mac and Linux too, and will continue to make it even faster and more robust.

We owe a great debt to many open source projects, and we're committed to continuing on their path. We've used components from Apple's WebKit and Mozilla's Firefox, among others -- and in that spirit, we are making all of our code open source as well. We hope to collaborate with the entire community to help drive the web forward.

The web gets better with more options and innovation. Google Chrome is another option, and we hope it contributes to making the web even better.

Friday, August 22, 2008

Deep Blue versus Kasparov

On February 10, 1996, Deep Blue became the first machine to win a chess game against a reigning world champion (Garry Kasparov) under regular time controls. Deep Blue - Kasparov, 1996, Game 1 is a famous chess game. However, Kasparov won three games and drew two of the following games, beating Deep Blue by a score of 4–2. The match concluded on February 17, 1996.

Deep Blue was then heavily upgraded (unofficially nicknamed "Deeper Blue")[9] and played Kasparov again in May 1997, winning the six-game rematch 3½–2½, ending on May 11, finally ending in game six, and becoming the first computer system to defeat a reigning world champion in a match under standard chess tournament time controls.

The system derived its playing strength mainly out of brute force computing power. It was a massively parallel, 30-node, RS/6000, SP-based computer system enhanced with 480 special purpose VLSI chess chips. Its chess playing program was written in C and ran under the AIX operating system. It was capable of evaluating 200 million positions per second, twice as fast as the 1996 version. In June 1997, Deep Blue was the 259th most powerful supercomputer, capable of calculating 11.38 gigaflops.

The Deep Blue chess computer which defeated Kasparov in 1997 would typically search to a depth of between six and twelve plies to a maximum of forty plies in some situations. An increase in search depth of one ply corresponds on the average to an increase in playing strength of approximately 80 Elo points. Levy and Newborn estimate that one additional ply increases the playing strength 50 to 70 points (Levy & Newborn 1991:192).

Deep Blue's evaluation function was initially written in a generalized form, with many to-be-determined parameters (e.g. how important is a safe king position compared to a space advantage in the center, etc.). The optimal values for these parameters were then determined by the system itself, by analyzing thousands of master games. The evaluation function had been split into 8,000 parts, many of them designed for special positions. In the opening book there were over 4,000 positions and 700,000 grandmaster games. The endgame database contained many six piece endgames and five or fewer piece positions. Before the second match, the chess knowledge of the program was fine tuned by grandmaster Joel Benjamin. The opening library was provided by grandmasters Miguel Illescas, John Fedorowicz and Nick de Firmian. When Kasparov requested that he be allowed to study other games that Deep Blue had played so as to better understand his opponent, IBM refused. However, Kasparov did study many popular PC computer games to become familiar with computer game play in general.

Thursday, July 24, 2008

Featur windows 7


Windows 7 has reached the Milestone 1 (M1) stage and has been made available to key partners.[15] According to reports sent to TG Daily, the build adds support for systems using multiple heterogeneous graphics cards and a new version of Windows Media Center.[15] New features in Milestone 1 also reportedly include Gadgets being integrated into Windows Explorer, a Gadget for Windows Media Center, the ability to visually pin and unpin items from the Start Menu and Recycle Bin, improved media features, the XPS Essentials Pack being integrated, and a multiline Calculator featuring Programmer and Statistics modes along with unit conversion.

Reports indicate that a feedback tool included in Milestone 1 lists some coming features: the ability to store Internet Explorer settings on a Windows Live account, updated versions of Paint and WordPad, and a 10 minute install process.[29] In addition, improved network connection tools might be included.

In build 6574, the Windows Security Center has been renamed the Windows Health Center, and focuses on monitoring the complete health status of the computer in a central location.

In the demonstration of Windows 7 at D6, the operating system featured multi-touch, including a virtual piano program, a mapping and directions program and a touch-aware version of Paint.

Source

Thursday, June 26, 2008

Online game


Online games are games played over some form of computer network. At the present, this almost always means the Internet or equivalent technology; but games have always used whatever technology was current: modems before the internet, and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. Many online games have associated online communities, making online games a form of social activity beyond single player games.

The rising popularity of Flash and Java led to an Internet revolution where websites could utilize streaming video, audio, and a whole new set of user interactivity. When Microsoft began packaging Flash as a pre-installed component of IE, the Internet began to shift from a data/information spectrum to also offer on-demand entertainment. This revolution paved the way for sites to offer games to web surfers. Most online games like World Of Warcraft, Final Fantasy XI and Lineage II charge a monthly fee to subscribe to their services, while games such as Guild Wars offer an alternative no monthly fee scheme. Many other sites relied on advertising revenues from on-site sponsors, while others, like RuneScape, let people play for free while leaving the players the option of paying, unlocking new content for the members.

After the dot-com bubble burst in 2001, many sites solely relying on advertising revenue dollars faced extreme adversity. Despite the decreasing profitability of online gaming websites, some sites have survived the fluctuating ad market by offsetting the advertising revenue loss by using the content as a cross-promotion tool for driving web visitors to other websites that the company owns.

Source

Tuesday, June 17, 2008

Mobile virus


The first instance of a mobile virus occurred in June 2004 when it was discovered that a company called Ojam had engineered an anti-piracy Trojan virus in older versions of their mobile phone game Mosquito. This virus sent SMS text messages to the company without the user's knowledge. This virus was removed from more recent versions of the game; however it still exists on older, unlicensed versions. These older versions may still be distributed on file-sharing networks and free software download web sites.

In July 2004, computer hobbyists released a proof-of-concept mobile virus named Cabir. This virus replicates itself on Bluetooth wireless networks.

In March 2005 it was reported that a computer worm called Commwarrior-A has been infecting Symbian series 60 mobile phones. This worm replicates itself through the phone's Multimedia Messaging System (MMS). It sends copies of itself to other phone owners listed in the phone user's address book. Although the worm is not considered harmful, experts agree that it heralds a new age of electronic attacks on mobile phones.

Common mobile viruses

Cabir: Infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.

Duts: A parasitic file infector virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes)

Skulls: A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. It also renders all phone applications, including SMSes and MMSes useless

Commwarrior: First worm to use MMS messages in order to spread to other devices. Can spread through Bluetooth too. It infects devices running under OS Symbian Series 60. The executable worm file once launched hunts for accessible Bluetooth devices and sends the infected files under a random name to various devices.

Source

Thursday, June 12, 2008

Rocketman


Ky Michaelson, a.k.a., “Rocketman” has been interested in rockets and speed since he was a child. At the early age of 12, Michaelson was given a Gilbert chemistry set for Christmas. That was his start in learning to experiment with various chemicals. It wasn’t long after that he learned how to make black powder, which led him to create his very first rocket motor. Although challenged with Dyslexia, Michaelson focused his academic energies into these and many other creations including a radio which he built and brought to school in a hollowed out math book. In 1969, Michaelson built a rocket-powered snowmobile that made its way into the Guinness World Book of Records. After accomplishing his first world record he decided to go after every acceleration record in the world. In twelve years, Michaelson’s rocket –powered vehicles set 72 state, national, and international speed records.

Michaelson has turned his passion into a career. As a stunt coordinator and stunt equipment creator/innovator, Michaelson has worked on over 200 films, television programs, and commercials including numerous Burt Reynolds movies and “That’s Incredible” television episodes. There have been literally hundreds of feature articles written about Michaelson and his adventures.

Throughout the years Michaelson has always held a great interest in space exploration.
Most recently he concentrated his efforts on rocketry. On May 17, 2004, Michaelson and his Civilian Space eXploration Team (CSXT) were the first civilians to get a federal license to launch a rocket above 100 kilometers, the official boundary of space. While accomplishing this lifelong dream, Michaelson reached yet another speed record of 3,420 mph.

Through all these adventures and record breaking activity Michaelson has held a high aesthetic criterion for his rocket-powered items. Each piece has been painstakingly hand crafted, and fabricated without the use of blue prints or written plans. Even when found or pre-fabricated items are used to complete a piece, Michaelson spends much time considering the complete and overall visual affect.

The Bloomington Art Center views Michaelson’s work as functional sculpture, seeing in them their crafted beauty as well as their completely functional use. We are excited to showcase this local talent, his adventurous life, and his quest for beautifully crafted rockets.

Source

Tuesday, June 10, 2008

Semi-transparent monitor detector for surface emitting light emitting devices

A structure for providing direct feedback of power emitted by a surface emitting light emitting device and the subsequent optical power control of the device is disclosed. In a preferred embodiment, an array of vertical cavity surface emitting lasers emit light having a wavelength which is partially detected by an array of photodetectors. The semi-transparent photodetectors array has an absorption coefficient which is relatively small at the wavelength of light emitted by the lasers. Most of the emitted light will be transmitted through the detectors while a small insignificant fraction in magnitude is absorbed and converted to photocurrent for monitoring the output power of the devices. The structure of the device of the present disclosure is simple, readily fabricated through uncomplicated techniques and of materials which do not effect the beam characteristics of the surface emitting devices.

source

Monday, June 9, 2008

Phoenix Sifts For Samples, Continues Imaging Landing Site


June 8, 2008 -- On Sunday, Sol 14 of NASA’s Phoenix Mars Lander mission, mechanical shakers inside the Thermal and Evolved-Gas Analyzer will attempt to loosen clumped soils on the device’s screens to allow material to fall into the oven for analysis later in the week.

The commands for this shaking action were to be sent to the spacecraft late morning Sunday, Pacific Daylight Time, and results will be reported Monday, June 9. Also on Sol 14, the robotic arm will acquire a sample from the "Baby Bear" site intended for the MECA microscopy station. Delivery of that sample will occur no earlier than Sol 16, after testing is done to sprinkle the sample.

A camera on Phoenix continues to image the area close to the spacecraft to extend scientists’ knowledge of the landing area and work sites.

Phoenix’s Robotic Arm Camera on Saturday took additional images of areas close to and under the lander unreachable by the larger Surface Stereo Imager (SSI), said Ray Arvidson of Washington University in St. Louis, Phoenix co-investigator for the Robotic Arm.

“We are mapping with the Robotic Arm Camera where the SSI can’t see to extend our knowledge of the site and to see details of the polygon structures of the near field, close to the lander,” Arvidson said.

An image from the Robotic Arm Camera taken Saturday and other raw images are at:

http://phoenix.lpl.arizona.edu/images.php?gID=3402&cID=51

On May 30, images taken under the lander showed the descent thrusters had cleared dirt from a smooth patch of either ice or rock. That area has been informally named “Snow Queen.” Mission scientists continue to examine that feature.

Sunday, June 8, 2008

keyboard trousers

Keyboard pants with built-in mouse, NERD ALERT

Wow, you’d have to be really nerdy to wear these keypants/keyboard trousers. I do a lot of nerdy things but wearing these pants is kind of beyond the pale. That said, how awesome are they? and the built-in mouse? Check out the close-up. Did you notice there are speakers built into the knees?




Great way to pick up girls at a LAN party.

source : ketok.com

Wednesday, June 4, 2008

Why I Hate Spam

But spam is worse than irritating. It is a drain on business productivity, an increasingly costly waste of time and resources that clogs corporate networks and distracts workers. Among consumers, it spreads scams, pornography and even computer viruses. Worse, spammers prey on less sophisticated e-mail users, including children, threatening their safety and privacy. And as everyone struggles to sift spam from their inboxes, valid messages are sometimes overlooked or deleted, which makes e-mail less useful and reliable as a channel for communication and legitimate e-commerce. In short, spam threatens to undo much of the good that e-mail has achieved.

As part of our drive to create a more trustworthy computing environment, this month, Microsoft filed 15 lawsuits in the U.S. and U.K. against companies and individuals alleged to have sent billions of spam messages in violation of state and federal laws. In addition to filing civil lawsuits and taking other enforcement actions, we are significantly stepping up our efforts to fight spam through technological innovation and cooperation with government and industry leaders. We are developing more effective anti-spam filters and other technologies that build on our research into fields such as machine learning -- the design of systems that learn from data and grow smarter over time. These "smart" systems are vital to the fight against spam because every defensive action causes spammers to change their tactics. Technology, to be effective, must continuously adapt too.

Already, spam filters built into MSN and Hotmail servers block 2.4 billion messages a day before they reach subscribers' inboxes. We have assembled a vast and fast-growing database of spam, which will be used by a forthcoming version of our Outlook e-mail software to block spam more effectively. And a new version of our Exchange e-mail server will include advanced anti-spam features. Our goal is to do everything possible to secure e-mail systems with servers that monitor and control the points of entry.

But a single company can't stem the tide of spam alone. So we are working with other industry leaders such as AOL, Yahoo! and EarthLink on a range of joint initiatives. For example, we are battling spammers who set up numerous e-mail accounts and move from service to service to avoid detection. To put an end to this shell game, we are sharing information so that we can keep tabs on roving spammers and shut them down more effectively. Spammers also go to great lengths to conceal or "spoof" their identities, so we are partnering with other service providers to identify and restrict mail that conceals its source. And we are creating a system to verify sender addresses, much as recipients' addresses are verified today.

A key to eliminating spam is establishing clear guidelines for legitimate commercial e-mail. With industry and consumer groups, we are developing best-practice guidelines to help responsible companies understand how to reach their customers without spamming them. Congress could help by providing a strong incentive for businesses to adopt e-mail best practices. Our proposal is to create a regulatory "safe harbor" status for senders who comply with e-mail guidelines confirmed by an FTC-approved self-regulatory body. Senders who do not comply would have to insert an "ADV:" label -- standing for advertisement -- in the subject line of all unsolicited commercial e-mail. This would enable computer users either to accept ADV-labeled mail or to have it deleted automatically.

As less junk mail reaches recipients -- and violators face stiffer sanctions for illegal activities -- the financial incentives for spammers will decrease, and spamming will lose its appeal.

Then maybe we can all focus on the e-mail that's actually worth reading.

Source

Wednesday, May 28, 2008

Technology

Technology is a broad concept that deals with the usage and knowledge of tools and crafts, and how it affects the ability to control and adapt to the environment. In human society, it is a consequence of science and engineering, although several technological advances predate the two concepts. Technology is a term with origins in the latin "technologia", "τεχνολογία" — "techne", "τέχνη" ("craft") and "logia", "λογία" ("saying").[1] However, a strict definition is elusive; "technology" can refer to material objects of use to humanity, such as machines, hardware or utensils, but can also encompass broader themes, including systems, methods of organization, and techniques. The term can either be applied generally or to specific areas: examples include "construction technology", "medical technology", or "state-of-the-art technology". Other species have also been observed to have created and used technology, including non-human primates, dolphins, and crows.

People's use of technology began with the conversion of natural resources into simple tools. The prehistorical discovery of the ability to control fire increased the available sources of food and the invention of the wheel helped humans in travelling in and controlling their environment. Recent technological developments, including the printing press, the telephone, and the Internet, have lessened physical barriers to communication and allowed humans to interact on a global scale. However, not all technology has been used for peaceful purposes; the development of weapons of ever-increasing destructive power has progressed throughout history, from clubs to nuclear weapons.

Technology has affected society and its surroundings in a number of ways. In many societies, technology has helped develop more advanced economies (including today's global economy) and has allowed the rise of a leisure class. Many technological processes produce unwanted by-products, known as pollution, and deplete natural resources, to the detriment of the Earth and its environment. Various implementations of technology influence the values of a society and new technology often raises new ethical questions. Examples include the rise of the notion of efficiency in terms of human productivity, a term originally applied only to machines, and the challenge of traditional norms.

Philosophical debates have arisen over the present and future use of technology in society, with disagreements over whether technology improves the human condition or worsens it. Neo-Luddism, anarcho-primitivism, and similar movements criticise the pervasiveness of technology in the modern world, claiming that it harms the environment and alienates people; proponents of ideologies such as transhumanism and techno-progressivism view continued technological progress as beneficial to society and the human condition. Indeed, until recently, it was believed that the development of technology was restricted only to human beings, but recent scientific studies indicate that other primates and certain dolphin communities have developed simple tools and learned to pass their knowledge to other generations.