Review Gadget

descriptions of all the gadgets specification.

12

LG ; SMS Competition

Likes doing SMS in all condition? If yes, please prove your greatness in competition Mobile Worldcup 2009 performed by LG. Place this racing will your accuracy and in SMS.

This is multiplying both LG to perform similar competition in international scale. Its(the present not half the battle, total amounted to US$1 million. Competition first round Mobile Worldcup 2009 will be started LG in Fatherland by 15 Augusts, four weeks after strarting of national league and event of related mobile.

A number of 200 participants will be confronted deftness of its(the jari-jemari in etic of SMS in Jakarta Theater to fight over position of national first champion. The winer [is] entitled to get present Rp 100 million ( US$ 9900 ).

Besides in Indonesia, similar competition also is performed in 13 other states: Vietnam, Malaysia, South African, Mexico, Spain, Portugal, Columbia, Argentina, Brasil, Peru, Rusia, China, and South Korea. The winners from each state then will deal with champion SMS from US and Canadian in final World Championship. Event of this final will be performed in US in November.

They will fight over title " The World's Fastest Texter" and opportunity to uproot world champion in Guiness World Record. The winner will be awarded US$100000.

Enthusiastic? Pleased towards to www.lgmobileworldcup.com to enlist and gets information is more detail. Last year, LG MOBILE WORLDCUP followed by 700000. This year, LG hopes can be draw enthusiasm more than 6 million participants.

Infected by video

Friendship netsite simply place [shall] no longer to braid relationship with friend and friend, but have been exploited by people who to try looks for financial advantage and also merely fad. Deception issue by stealing account Facebook also has started.

Twitter also the same. Allerted, if you receives message and junction like this:

• My video Home :)

• Watch my new private video! LOL :)

• michaeljackson ' testament on youtube

If the junction you clicked, you will be brought to false video web site asking for you to downloading codec to look on above video. Though codec actually is W32.Koobface.A – variant from worm W32Koobface is emerging first time at August 2008.

If You have been infection, hence Koobface will plough your session so(after you are logon to Twitter. Your Account are taken, then W32.Koobface.C sends tweet infection to of the followers ( follower) in Twitter consumer.

So what which must be done? One of them is is avoid clicks URL at tweet, especially if tweet promotes video Home. Other strike is protect x'self with software strong security and safety and up-to-date. So(after suggestion Symantec.

AMD : Announces Five Istanbul New 6-Core

Five processors Istanbul new 6-core is announced [by] AMD. Three among others balmy server 2P and two other aims at model 4P/8P. this new CPU-CPU figures in two processors SE for server area focusing at performance and three processors HE which more economical of energy compared to series standard version 6-core 2400 and 8400. Later, AMD will offer chip EE is consuming its(the energy?power only 45 watts.

For server 2P, AMD offers 2439 SELENIUMS ( 2,8GHz, 105 watts), 2425 HE ( 2,1GHz, 55 watts) and 2423 HE ( 2,0GHz, 55 watts). While for server 4P/8P on the market 8439 SELENIUMS ( 2,8GHz, 105 watts) and 8425 HE ( 2,1 GHZ, 55 watts). This chips on the market at the price of premium above processor 6-core 75 standard watts introduced at the beginning of June then.

Newfangled 8439 SELENIUMS is esteemed [by] US $ 2649, while 8425 HE is esteemed [by] US$ 1514. Model 2439 SELENIUMS is sold [by] US$ 1019 and 2425 HE at the price of US$ 523 ( 2423 HE: US$ 455).

About performance, AMD claims its(the SE processor is parallel with chip Nehalem Intel, and, at least at configuraton 24-core, 4-way, this green team now more pre-eminently is compared to Intel. This if we are opening integer rate of return registered for benchmark Spec CPU2006. Configuraton 2-way 2439 SELENIUMS and 8439 SELENIUMS seen precise in the middle of processor performance Nehalem, among Xeon E5504 and E5520. Draws it, this cheaper Intel chips - US$ 224 in low end and US$ 373 at high end.

AMD seen to be conscious that they cannot compete with performance Nehalem property of Intel. In consequence pre-eminent his(its at Istanbul is approach “ balanced”, including consumption of energy?power. Of course, chips Istanbul finishs slimmer of energy?power compared to property of its(the rival: 75 watts for standard configuraton, 105 watts in product is having performance height, and 55 watts in version low power. Unhappily, measuring rod both unegual. Intel publishs consumption of its(the processor energy?power in thermal power maximum rating, medium of AMD in rating consumption of mean energy?power.

AMD also outspoken compares its(the 6-core processor with product Intel. But is mentioned that its(the HE processor presenting performance per more 18% watt compared to its(the standard CPU>Central Processing Unit. Selenium Processor 6-core around quicker 50% compared to processor SE quad-core. So(after claim AMD.

Headset Bluetooth

Headset Bluetooth first thin ultra in world for notebook, so(after claim Newton Peripherals about product which so called this MoGo Talk. this Headset can be kept and di-charge in card slot ExpressCard a notebook. Thereby, headset always stand-by to be used telephone via Skype, VoIP, or ponsel.

We check all headset the Bluetooth in market, starts from board producer to until Jawbone and Plantronics, and finds that consumer always burdened by compulsion to fill energy?power and save the power headset its(the Bluetooth, doesn't care how also good of quality of audio and noise suppression,” said Stuart Nixdorff ( CEO, NEWTON PERIPHERALS). “ All headset Bluetooth in the existing market not balmy is used. Nobody is liking when will make call simply its(the headset death; and nobody which membawa-bawa will as of cable sack;bag, charger to consort headset which big. What is the good headset otherwise there are its(the energy?power and not balmy is pocketed?”

Design MoGo Talk of course differs in from most headset Bluetooth. Combination switchings earbud/earloop, Mogo Talk applies an eartip flexible thin rubber adapting to form of ear, at the same time blacks out external voice ( noise).

this Headset designed by thinking of computer producer OEM.

Besides MoGo Talk, Newton Peripherals offers various peripheral of other ultratipis, for example MoGo Mouse. MoGo Mouse is a mouse Bluetooth as thin as 5mm which also is kept and filled its(the energy?power in laptop.

MoGo Talk which heavy of 9 gram with dimension 2,4x5x0,5 cm is has been bought in www.mogostore.com. The Price US$ 99,99.

Chrome OS

Comments Microsoft the problem of Google Chrome OS finally complete has. After CEO MICROSOFT STEVE BALLMER gives comment, innings Bill Gates now gives assessment.

All criticizes, for Bill Gates, Chrome OS do not more than Linux. According to him, operating system enlarged upon by Google only one of so much distro Linux.

" There is a lot of form of operating system Linux everywhere and package in the way of differs in and benefit to differ in," he said when held an interview with CNET News recently.

According to him, nothing that really has just from Chrome OS. Its(the supposing a browser inculcated at netbook which has implemented Android. But, s(he confess exactly surpriseds because comments many people about abundant Chrome OS.

Bill Gates tells, opinion telling that browser as terminology abuse operating system only. According to him, browser which can implement application, various plug-in, and work only show broader browser concept.

Nokia : go down

In Indonesia Nokia is brand handphone a real enthused, always in demand beloved. But from its(the country of origin, Finlandia, papaya ugly news about performance Nokia.

This second quarter Nokia only successfully pockets up net profit 380 million Euro from sale for the price of 13,5 billions Euro. Far this declines compared to net profit at the same period last year, namely 1,1 billions Euro from sale of 13,15 billions Euro.

CEO NOKIA OLLI-PEKKA KALLASVUO tells, the quarter weight. But s(he also tells that Nokia successfully increases his(its global market share becomes 38% and boosts up his(its bright ponsel market share becomes 41%. “ Competition remain to stringency, but request in peripheral market mobile as a whole seems to decline.”

According to prediction Nokia, numeral in third quarter of approximately would equal to second quarter. World mobile x'self is estimated will go down 10% compared to the year 2009.

hacking : south korea attacked

Waving hacker attack to a number of situs in two United States states ( ACE) and South Korea known comes out of 86 addresses IP in 16 states.

That thing is laid open [by] South Korea parliamentarian, Chung Chin-Sup to journalist, as followed by Yahoonews, friday ( 10/7). The statement is thrown [by] Chin after giving guidance to National Intelegence Service ( NIS), Korsel to investigate furthermore address IP attacker. Chin tells, the 16 states is inter alia, South Korea, United States, Japan, and Guatemala. " So Far North Korea of course not included into 16 country of origins 86 IP addresses," said an other parliamentarian, Park Young-sun. still, NIS remain to anticipate that North Korea still can be accused resides in the attack back. Before all, Korsel has suspected puppeteer from attack of is North Korea. Do not only South Korea, US government also accuses North Korea as ringleader from attack. But to prove the attack, ACE confess hardly difficulty. Accusation towards North Korea, be reasonable, because North Korea is being floodlighted related international world of ujicoba nuclear rudal and state rocket below(under leadership of Kim Jong Ill.

Facebook : Log 250 Million Consumers

Facebook, which has become site the biggest social network in world, has owned 250 million active consumers or rising 50 million during around three months. " 250 million of you stays at Facebook today is what is giving Facebook life and makes this page means for every people to apply it," writes Mark Zuckerberg, founder Facebook in its(the blog, Wednesday ( 15/7).

Beginning Of April, Zuckerberg tells, Facebook reachs 200 million active consumers in the world. The network only having 150 million consumers at January 2009. " Step of quickly our simple growth and excites for us, and that affirms that people everywhere realizes strength to incircuit by any means interesting for they are in Facebook," said Zuckerberg in its(the statement. " For us, development thus 250 million consumers is not merely impressing amounts, that is sign about how many the relation of person is earning you are of all creates, and how far we are in Facebook must make a move to extend strength of the relation of with billion people in the world," he/she said. Facebook, what build at Februari 2004, now becomes privat enterprise and having station in Palo Alto, California. Mid July, gets about report that Digital Sky Technologies, Russia investor company, agrees pays [for] US$14,77 for one shares for share with Facebook so that network laman the social is valuable 6,5 dollar billions AS.

Firefox 3.5 : faced new problem

not too long released, newest Firefox of version 3.5, has faced new problem. US-CERT ( Computer Emergency Response Team) merilis commemoration, Tuesday ( 14/7) this, that browser Firefox 35 having susceptible defence system is attacked [by] long distance attacker ( remote attacker) by threading dangerous codes.

More clear, susceptance owned by Firefox 35 relating to Firefox how to process JavaScript code. Example of from dangerous code of itself have been showed Monday then ( 13/7) in site Milw0rm,com, a site about exploitation of dangerous codes. The thing peeps out possibility that susceptible of Firefox 35 has started powered. The Side Of Mozilla x'self has known this susceptance problem to and starts does repair testing. But, till now unfinished is developed patch its(the penambal. Therefore, Mozilla release advice to minimize attack risk. " Susceptance can be exploited attacker if s(he successfully trap computer consumer to see site having the dangerous codes," says the side of Mozilla in their Security Blog. Still, susceptance from Firefox can help by the way of kills JIT in Javascript Engine Untuk to kill Javascript engine can be done with three steps. Firstly, types about:config in column search your Firefox browser. Second, types jit in filter column located in to config editor. Third, click twice line javascriptoptions.

jitcontent to change its(the value becomes false.

As mode alternative, plug-in NoScript also able to be applied to kill all JavaScript of the browser. This susceptance problem also has got many commentses from some computer companies in world. Secunia, a company which active in computer security and bases on in Denmark for example assessing level of susceptance from Firefox 35 very critical and even can influence Firefox stripper version. F-Secure, company of Finlandia which active in the same with Secunia also adds that software Exploit Shield can hinder exploiting of dangerous codes to groan Firefox 3.5.

HP PROBOOK

" HP PROBOOK, it's slim, stylish, and All Business". The enough strapline to explain core from series is newest notebook of HP, ProBook. Today, Thursday ( 16/7), in IndoChine FX Mall, HP INDONESIA officially launchs HP ProBook 4410s ( 14 inchs), 4510s ( 15,6 inchs), and 4710s ( 17,3 inchs).

this Probook Series is router HP EliteBook, series hi-end from notebook HP, which has won many appreciations. The difference, series ProBook created to present a dressy and taft notebook, but reached from the angle of price. Doesn't triffle, that series is this notebook can reach middle small industry, HP installs the price of ProBook below(under US$1000. For HP PROBOOK 4410s for example, can be got with the price of US$699 and US$799. " HP PROBOOK takes element of tough HP EliteBook and element affordable from series Compaq," explains Yohan Wijaya, Market Development Manager, HP BUSINESS NOTEBOOK.

Even the price of cheap, do not mean HP ProBook is series is low notebook. In line with mainly to be notebook which is taft but is reached, HP PROBOOK has specification which as of quality of notebook hi-end. For series 4410s for example present with VGA Card ATI Radeon HD 4330 which mumpuni for graphical business, slot HDMI to feel High Definition Experience, and Processor Intel Core 2 Duo. Besides specification which pertained whew, HP PROBOOK also has five fitur which they signalize and believed has not been owned notebook other brand. Fitur which is first is HP Quicklook 2 enabling consumer ProBook to check Microsoft Outlook ( enamel program) with one knobs and in a state of notebook death. " In calculation second, you can check Microsoft Outlook. You can see enamel, addres book, and your agenda," says Yohan Wijaya to explain function of HP Quicklook.

second Fitur is HP File Sanitizer. HP FILE SANITIZER is fitur to vanish file or folder wanted without poison direstore again. Believed sector Zero Cluster in harddisk drive also cannot be exploited for merestore file which have been vanished this fitur. Fitur which is third is HP 3D Driveguard. As prevention of its(the breakdown harddisk drive, HP installs fitur Driveguard to kill job(activity harddsik if laptop stay in certain speed or inclination. Keyboard also doesn't miss from attention HP. fourth Fitur is Spill Resistant preventing its(the breakdown keyboard if sprinkled [by] water ( dilution) from the top (of) ( not from side).

Last but is note least, last fitur posed at HP at roll-out of ProBook is HP Privacy Filter. this Fitur good for protecting our laptop from party(sides eye which wish to peep what coming up in monitor [screen/sail]. If it is seen from side kanan/kiri, [screen/sail] will seen black. With specification which pertained height, fitur which is special is developed, and price which enough to be reached, HP PROBOOK can be made choice by consumer is notebook which wish to look for notebook with quality of hi-end, the price of low-end. " With range the price of like this, has not there are laptop that stylish with fitur-fitur business like the one is we offer," express Yohan Wijaya to affirm excellence of series ProBook. HP PROBOOK is available in choice ruddles marun and black.

Ponsel Solar energy

PT Indosat realizes commitment to give telecommunications service to all walks of life by presenting Telepon Seluler ( Ponsel) Style ( Solar energy). An energetic ponsel of first solar in Indonesia, which for early stage is planned to do to supports program Rencana Definitif Kebutuhan Kelompok/ RDKK Online Dekopin ( Co-Operation Council of Indonesia) for Indonesia farmer.

this Ponsel Gaya will become one of supporting facilities for supporter to realize RDKK Online for Indonesia farmer, works along with INKOPTAN ( Co-Operation Mains of Farmer and Nelayan). which will be opened in the near time.

Ponsel Gaya devoting of this Indosat later will become supporting facilities for communications for public?people /petani by using friendly solar energy of area. " In the near time this ponsel also can be enjoyed by wide public," said Johnny Swandi Sjam, Managing Director Indosat, Rabu ( 15/7) in Jakarta.

RDKK x'self is a the application of IT integrated assisting farmer to fulfill requirement of information and communications in activity farms which will be done onlinely by using telecommunication network facility nirkabel ( GSM) so that farmer can be assisted swiftly and efficient. Indosat which during the time also is known as environmental care company passed Green Indonesia program, copes presents ponsel which has area friendliness too, by exploiting a real abundance and cheap solar energy, so that not necessarily apply electric power which its(the resource in nature on the wane.

Ponsel Gaya doesn't fail with ponsel generally energetic ordinary electrics. With design that is enough trendy, this ponsel anti-shock, dust resistance for activity of outside space, and had power management in the form of automatic charge if it is hit sunshine, if battery capacities less than 90 %.

From its(the service side, stylist ponsel present with a real price reached that is Rp 480000,- ( including PPN), with card Mentari presenting many benefits and bonus for example bonus SMS 50 SMS / every accumulation of refill 20 thousand, internet bonus 220 minutes, bonus speaks 120 minutes as well as applicable to enjoy program Obral Obrol Mentari that is free of charge speaks 60 minutes to number humanity Indosat by the way : types : chats and sends to 303. This ponsel will be able to be enjoyed by common public by the end of coming July.

Pin Tablet Wacom Intuos4

Pin tablet had non toy of the commercial artists again. But for who may only, starts from professional artist, amateur, until they which digital photography hobby. So(after concept rear bargain Wacom Intuos4 introduced by by opening distributor Wacom, Datascrip, in Jakarta yesterday noon ( 15/7). They accustomed draws with water color also will interest with this product. Combination between Intuos4 and Corel Painter makes its(the consumer almost feel the same thing like when using ordinary water color. Tablet area is canvas here, while pen becoming paintbrush. Not necessarily doubt if you are left handed hand. Cable USB – of can be stuck in left side or right, be at the discretion of your habit.

Having stock pin tablet Intuos4, certain region from an image can easily dipergelap or made to be bolder in Adobe Photoshop CS4 or Corel Painter 11 – compatible for they liking strand gambar/foto. Not necessarily be strong depress pen to tablet area, because pen Intuos4 now can feel pressure equal to 1 gram only ( at Intuos3 needs 10 grams), alias is more sensitive. Level of pressure also ( pressure level) tip of pen also dilipatgandakan out of 1024 becoming 2048 that recognition can take place more precision, accurate, within reason touch paintbrush. His own tablet having colour black. Eight knobs ExpressKey which able to be program group of in right side. Function Of ExpressKey now demonstrates lables LED which will blaze, so that consumer is not necessarily be busy keeps in mind funsi any kind of arranged by it for every knob. a knob Touch Ring enables we to arrange level of zoom and pen measure, turns around canvas, furls, and chooses layer only with touching fingertip. this pin tablet has tidied software Adobe Photoshop Elements ( version 6 for Mac, version 7 for PC), Corel Painter Sketch Pad, Autodesk Sketchbook Express, and Nik Color Efex Pro filters. So consumer may directly apply Intuos berkreasi to, including photograph strand to, without confused with business software. Photograph strand to, tries using dodge tool in Photoshop or Painter.

So if we like to learnt to become Ansel Adams or Rembrandt, pleased menjajal Wacom Intuos4. This pin tablet is available in four measure choices: 4x6 inchs, 6x9 inchs, 8x13 inchs, and 12x19 inchs. The price each is US$ 235, US$ 360, US$ 485, and US$ 780.

Asus Eee PC T91

Of Course Asus there is no its(the death. Innovation for the shake of innovation continuously is presented company Taiwan which is this netbook exponent. its(the Netbook Seashell is just is introduced, and now have been presented a netbook which is totally differ from habit. this Eee PC T91 is really on unique.

its(the LC [Screen/Sail] can be twirled and folded, very similar to style PC tablet. Not only that. Wight netbook sails this rotary also light, only 0,96kg. Dimension his own physical 22,5x16,4cm. this Netbook demonstrates [screen/sail] 8,9” with resolution 1024x600 - rather small if it is compared to [screen/sail] at the line of netbook present. But remain to just of flimsiest peripheral epithet ( 0,99 – 1,11 inchs) and lightest is girded [by] it. Facility and equipment of Eee PC T91 non different with most the netbook: Bluetooth 21 + EDR, WI-FI 80211b/g/n, Webcam 0,3 megapixel, port VGA-OUT, RJ-45, 2 USB port 20, jack headphone/mike, slot MMC/SD, twin speaker, and a trackpad. As storage is tidied [by] SSD ( solid state disk) 16GB, a card SDHC 16GB, plus Eee Online Storage equal to 10GB. Optical drive, as usual, absent in this netbook. Netbook with touch screen which able to be turned around this applies processor Intel Atom Z520 1,33GHz. As processor associate, have been inculcated graphical chip integrated Intel GMA 500, what supported RAM DDR2 1GB.

Like at Asus Eee PC Seashell, battery at this Eee PC T91 cannot be released, alias non-removable. Only type his(its is permanent Li-Ion, what claimed can stay until 5 hour(clock. Asus Eee PC T91 comes complete with operating system Windows XP Home in two colour choices: b/w.


Nokia 3720 classic

Brings ponsel when having the day off to coast hardly risk because sand and water might possibly destroy it is at once more than anything else if it is plunged water. But doesn't worry with Nokia 3720 Classic which released on Thursday ( 9/7).

" Does applies it along the beach or in location of dusty development, Nokia 3720 classic specifically has been engineered to hold up cipratan, resistant of blow, and resistant fallen," says my Mark Suomi, vice president Connect Devices Nokia in its(the press release.

Its(the packer material is design hardly meeting and doesn't pierce water, resistant incised, and durabel. its(the Bateria is wrapped cover?conclusion locked with spanner so that protected from water diffusion or dirt.

Still its(the appearance remain to draw with bright colour choice. Its form of course conventional but its(the fitur remain to high like three bands GSM, camera 2 megapixel, colour [screen/sail] 2,2 inchs, and Nokia Maps. As ponsel outdoor, there is fitur flashlight LED.

Nokia 3720 classic will be available with price range 175 dollars AS or a little below Rp 2 million. In its(the sale package is including memory bonus eksternal 1 GB.

Symantek : New Anti Virus

Malware and new security and safety threat always just emerged. Hence solution of security and safety can swiftly becomes obsolescence. More than anything else according to the researchers Symantec each month is more than 200 million attacks, and majority is new threat and sent via Internet.

Number of new threats of that cannot be made balance to by product producer sekuriti, including Symantec creating almost 1,8 million new definitions. Sees system volume infection in world, one a real clear things: protection of security and safety of base insufficient good, said Rowan Trollope ( Vice Senior President, Consumer Business Unit, Symantec) in rilis its(the mass media.

Because that is Symantec Corp. introduces new standard for all protection aspect. With ' Quorum’ we can stop the cyber criminals, though we have never seen form of threat they before all, said Trollope.

Quorum is name of new protection system code of Symantec is being based on fuel of signature traditional malware, and new reputation fuel with smart control system choosing approach which more suited for handling specific threat faced.

Besides introducing detection of threat to base on reputation, Project Quorum also considers again other fundamental aspects, like notification of security and safety status, threat omission, antispam and old fellow control ( parental control).

Presentation of his own product is Norton Internet Security 2010 and Norton AntiVirus 2010. Both this products will be launched opening at October 2009. But the existing of you has can taste its(the beta version.

If interests with Norton Internet Security 2010 betas, please visit www.norton.com. While for Norton AntiVirus 2010 betas, towards to www.norton.com. The penjajal this beta version suggested to give input and shares experience in online forum Norton Public Beta Forum.

Intel Coorperating

World. But, s(he refuse to explain furthermore form of the same job(activity.

Position Of Intel for project of Chroem OS of vital importance remembers the existing of its(the processor mastering 90 % world computer market. But, on the other side support from to Chrome OS dilematis remembers most of computer to base on Intel has supported special same job(activity with Microsoft Windows.

Even Intel peculiarly release has project of bass operating system open source Linux so called Moblin. Siste oeprasi to support netbook second generation and peripatetic peripheral so-called MID ( mobie internet devices).

But, purpose of main of Intel actually one just namely makes processor platform Intel Atom to become choice of all the peripherals. Is Windows, Chrome OS, Moblin, or other operating system seen to be do not become spraging for Intel to support it.

" Purpose of long-range of we provide hardware for peripherals with various sitem operation... semakain many competitions will push more innovation and that is good for consumer," says Michael Chen, sale director of Intel Asia Pasifik to Engadget.

Sony : Launch Two Camcorder With GPS

Sony with two his(its new camcorder: Handycam HDR-CX520V and HDR-CX500V. Both camcorder using this Sony G Lens demonstrates resolution 1920 x 1080 ( full HD) and ability records silent picture to 12 megapixel.

Both ready to give output 60p, automatically converts haul to 60 progressive frame per second if you connects it to TV HD which compatible with cable HDMI. Result of its(the AVCHD video record also able to be converted to video MPEG-2.

In both this available camcorder of Optical SteadyShot with Active Model enables element of lens can be make a move to shift with the range of movement which more wide when camera is shocked together with imagery processor BIONZ property of Sony and new function of Face Touch.

O yes, Face Touch is mode enabling consumer to choose one faces in LCD [screen/sail] camcorder to be optimal focused and arrangement exposure. Face Touch also triggers mode Smile Shutter, that with his(its, consumer automatically records a picture 12 megapiksel so(after the subject smiles. Smile Shutter also able to be arranged to aim at photograph when camcorder is recording video.

other Fitur include;covers Face Detections, back-illuminated Exmor R CMOS censor, six-blade aperture, and antenna; built-in GPS for geo-tagging, LCD contact panel plus 3 inch. Existence Of GPS causes you can arrange and presents displaying video in new way. For example, depress a marker in map at its touch screen will turn around video recorded in the location.

GPS here can show location place of you to record in real time. this compatible Fitur for videografer which is lazy access menu date and time. Receiver GPS would automatically accomodates and renews date and time to display camcorder, depend on time zona place of you resided.

Consumer nor needs is busy with depositor capacities in this camcorder. CX520V have been equiped with internal memory 64 GB, and CX500V capacities gold ready to 32 GB. But, if internal memory of that your assumed less, adds just of memory stick PRO- QUICK SILVER Duo HX.

Sony HDR-CX500V and HDR-CX520V will be available in September coming, with the price of the range of each US$1100 and US$1300.

Presents Online and Offline Photograph

The application of this of on unique, enables collection of your photograph in harddisk PC and also which has displayed in illusory world ( as in service keeps photograph Flickr, Picasa, or Facebook) presented from a program. Result of seeking of picture in Google also can be displayed it outside browser.

Way of displaying every its(the photograph is also unique because through window impressing 3D. Manages it is very easy is added [by] movement effect of 3D pleasing for watch.

Forgiveness, title the application of this instead has not been called as. Its(the name Cooliris. The maker calls it as full-screen 3D wall. Actually Cooliris is plug-in for internet browser that is compatible with Firefox, Internet Explorer, and Safari its suited for Windows, Linux, and Mac OS.

Even forms browser plug-in, you can activate it through?via program list in menu Start in Windows. Because having the character of 3D, graphical card which you has shall require, even do not must specification of height or newest.

To be able to exploit it, install formerly this plug-in by visiting site www.cooliris.com. Way of its(the installation easy, its(the management easy to. Tut, Cooliris also able to be used presents collection of video.

Like this its way:

1. Implements your browser supported by Cooliris ( Firefox, Safari, or Internet Explorer). Enters to address www.cooliris.com/download-all.php. Select;chooses application matching with browser and operating system which you uses, then clicked link [ Download] the in right side.

2. If You applies Firefox, will emerge bar pop-up below(under toolbar top browser. Click only [ Allow]. Box " Software Installation" will emerge. Knob click [ Install Now]. After his(its, restarts browser ( killed then recommits).

3. Now, each time emerges picture or photograph in a number of web sites ( like Google Image, Flickr, or Facebook), hence gambar/foto can be presented self-supportingly in Cooliris. Firstly, points pointer to picture until ikon two knobs is having sign arrow above picture.

4. Picture click, hence picture will emerge in Cooliris 3D wall. To enlarge picture appearance, ready to click one of picture causing big. Quality of picture appearing will be adapted for resolution of original picture. If small, but is forced to become big, picture will break.

5. Wall this 3D you can shifts when is choosing photograph. Klik-tarik picture area towards which you likes, hence wall will make a move in three dimensions. To enlarge or minimizes appearance the line of picture, applies knob scroll at mouse.

6. Tries logins to account Facebook and admission to collection of photograph. Points photograph to collection of photograph over there, then clicked photograph when emerging ikon two knobs with arrow sign. Now all your photograph collections in Facebook will be presented in wall. Logo Facebook automatically will emerge on the top wall.

7. If will present the photograph in harddisk PC, click [ My Computer] at sidebar in left side to wall. If You want to save in folder My Pictures, click [ My Pictures]. If on file in desktop, click [ Desktop].

8. If You are its(the menyimpan in a folder in a directory, partition harddisk, or on file in USB flash drive or harddisk eksternal, clicked formerly link [ Disk]. Hereinafter, select;chooses directory or drive, and traces existence of picture from root emerging folder.

9. The application of this can be direct access from program list with clicking [ Start] > [ All Programs] > [ Cooliris] > [ Launch Cooliris]. Cooliris also able to function as search engine to draw and video. To apply it, points pointer to box “ Search” in upper right side.

10. Types keyword, then selected web site place of picture or video will be searched - starts from Google, Yahoo, Flickr, Picasa, until YouTube. Hereinafter, magnifier ikon click or compress [ Enter]. Result of his(its will be presented in wall. the Picture click or video to present it.

Microsoft : warns dangerous security

Operating system consumer Windows XP and Windows Server 2003 proper allert to new security and safety gap is announced by this. Because, hitherto Microsoft has not successfully finds the bargainer and has not there are patch to patch it.

Pass the security and safety gap, illusory criminal can easily infiltrates to victim computer and controls is full from long distance through extension Internet. But, interposed new this can be exploited to infiltrate if victim subconsciously gives way when accessing site which has been infection bad program.

The expert of security and safety express attack through the security and safety gap takes place is intensive within a week last. Thousands of site has successfully ploughed to propagate bad program applied to exploit the prey computer.

The weakness stems from weakness at Microsoft Video ActiveX, component software applied to play video in Windows. Problem emerges because interaction of the component with Internet Explorer opens security and safety gap which is easy is pierced by hacker.

software consumer asked to deactivate component that berisiko by doing setting in Microsoft site. Takes heed phising which disebarlewat spam also need to be improved. Doesn't click link site which has not been believe.

Commemoration of existence of security and safety gap usually is done every Tuesday second week per month. Announcement which dirilis Monday ( 6/7) this is including seldom and indicates that level of its(the threat height. Now, Microsoft still developing the cure.

Rekso Translator 3

Rekso Translator is British translation software to Indonesia and Indonesia to English.

Rekso Translator is initial form of translation software which we prepare to differentiate science discipline, like : medical, technique, philosophy, law, etc.

Rekso Translator also prepared to have relationship sensitifity, capable to make it can choose correct meaning from the same type of word choice; for example : run = runs or implements? Rekso Translator also is prepared to be able to give explanation of term.


With Rekso Translator, You may hope that translation of English to Indonesia or Indonesia to English can be done quickerly easier and; sentence to sentence, paragraph to paragraph, even chapter to chapter. From The Angle Of Time You also would hardly is assisted, draft of your translation will ready during calculation minute, because Rekso Translator translates around one seconds per page!. We also designs this software simple and easy to is operated, side that, our Customer Support also ready to assist solving your difficulty.

Rekso Translator also hardly easy to be applied and its installation is also easy, not like other translator of this software translates as accurately, became if it is terdadi mistake, usually happened at article which will be translated especially its spelling

We protect Rekso Translator with password, because we anticipate the happening of piracy which able to become the heaviest resistance in making perfect Rekso Translator. It is really we would hardly is assisted and complimented can may receive information about illegal copy Rekso Translator, for we folow up judicially
DOWNLOAD REKSO TRANSLATOR 3

Motorola : Newest Shift Mode Technology

Motorola design ROKR E8 to give comfort for music and talc for consumer. By using teknolgi ModeShift from Motorola, quad-band GPRS/EDGE dedicates amenity only one controls to user as they require and when they to require it. Amenity with one just control is will transfer from music player to telephone with one knob touchs.

When handphone is killed, [screen/sail] ROKR E8 would be slow losed smoothly without having to depress any key. With one touchs from music key virtual, telephone key pad will be replaced with key control to play music sepertiplay, pause, forward and rewind. ROKR E8 also is nicknamed navigation “ Fast Scroll” newest from Motorola, which in the form of variable control speed-touch giving amenity to consumer for scroll of all content of the handphone. With one fingers, consumer can play content music ( music mode), opens contact ( phone mode), calendar ( phone mode) or multimedia ( imaging mode) at landscape display 20” QVGA.

In music mode ROKR E8 dedicates hard voice with fitur stereo three dimensions capable to increase audio channel and equalizer on-board. ROKR E8 also is equiped with speaker and Bluetooth which compatible with stereo headset. ROKR E8 assists consumer for search and discover new music from FM Radio and support to Song ID2. Internal of memory owned by ROKR E8 menyimpan data can finite of 2GB with 1500 songs, while external of its(the memory can be added finite of 4GB with microSD card. Transfer of music hardly quickly with USB 20 compatible with Windows Media Player 11 in computer.

In phone mode, ROKR E8 has technology Motorola CrystalTalk functioning to receive penggilan when download or plays music, text messaging, browsing Web or takes picture. ROKR E8 with front appearance which high gloss, dorsal appearance with black alumunium soft touch, side key made from metal to show modern quality of newest style from Motorola.

Specification of complete ROKR E8 property of Motorola :

* Frequency : quadband GSM music phone, GPRS/EDGE,BACKLIT touch keyboard, Omega Wheel.

* Camera : 2 megapixel

* Memory : Internal of 2GB, external of microSD card

* Fitur : FM radio, Technology ModeShift, Fast Scroll, Crystal Talk™, Windows™ Media Player™ 11

* [screen/sail] : 262k color QVGA display, 35mm headphone jack, speaker stereo

* Connectivity : Bluetooth 20(A2DP)

Google Adsense

Adsense can be supposed someone who is renting some of farms or building which s/he has to be occupied advertisement where s/he will get money to its(the service. so, adsense will advertise adwords, so(after his(its picture easy to. if advertisement adsense in the form of text clicked by visitor or search engine column applied for looks for information entering in categorizing ads by google, hence owner of site will get money from every click done by visitor.


with this adsense program, you can have blog,web, or portal displaying advertisement adsense. when there are visitor visiting blog, web, or portal property of you and does advertisement click, you will get dollar, even when you are sleeping. the good news is you can start adsense freely. even with blog or free web.

Nurcholis, owner of portal eNdonesiacom : " inclusion of Nurcholis passed eNdonesia of course only from advertisement affiliating to google adsense. Its(the value not too big, but can be applied takes care of wife and chlid ".

though google offers wide access to various konten in making an index to seeking, but displaying in program adsense can only place advertisement google in situs obeying guidance konten, and advertisement the may not be presented on page it doesn't matter mostly its(the onten using language that is is not is supported. Program Policies

Ensuring Security Of Servers And Databases

Ensuring security of servers and databases is an essential need for all workplaces. It is a crucial step for Network and Database administrators to provide a safe and secure working environment without any worries of vulnerability. Nowadays, protecting any network environment from online threats, frauds, and data theft is the most important task for Network and Database Administrators.

Cases of Credit Card Information theft and Personal Information theft are very common nowadays. The popularity of e-Commerce and online shopping is increasing. People have become dependent upon the internet for almost everything. They do not hesitate in providing their personal or banking information (credit card details or bank account details) to e-Commerce websites. Therefore, it is duty of the e-Commerce website owners to provide maximum security to these users.



Possible Security Threats for Servers and Databases

Hackers and cyber criminals have become more intelligent nowadays. For them, breaking any type of security takes just a couple of minutes, if the network is not properly secured. The most harmful threat is possibility of stealing crucial data from online servers.

In last few years, several cases of internal security violation have come into limelight, where employees were responsible for stealing or sharing data with external entities for their personal benefits. The resultant is that, nowadays not only external security is important, internal threats also can't be overlooked.

Other major security issues are protection of crucial data from viruses, Trojans, and malwares. Protecting servers or databases from being crashed is also a tough but essential task for network administrators.

Security Solutions

Nowadays all software manufacturers give proper attention to security. Modern Operating Systems and Database Management Systems come with inbuilt security features. Security features like Firewalls and basic security from viruses are in-built with all modern operating systems. Databases also have fault tolerance and integrity features, different kind of locks impose access security to database.

To ensure maximum protection from any kind of vulnerability implementation of physical security as well as application security is required. Physical security can be ensured through restricting access to crucial areas for only authorized people, round the clock close circuit monitoring, and employing security personals. For Application Security, one has to adopt latest Antivirus Software, Firewalls, Intrusion Detection Software, as well as strict passwords.

However, nothing is enough to provide you permanent security from intelligent but destructive cyber criminals. Therefore, regular assessment of security systems is very important to maintain complete protection of your crucial data and information.

Ensuring Security Of Servers And Databases

Ensuring security of servers and databases is an essential need for all workplaces. It is a crucial step for Network and Database administrators to provide a safe and secure working environment without any worries of vulnerability. Nowadays, protecting any network environment from online threats, frauds, and data theft is the most important task for Network and Database Administrators.

Cases of Credit Card Information theft and Personal Information theft are very common nowadays. The popularity of e-Commerce and online shopping is increasing. People have become dependent upon the internet for almost everything. They do not hesitate in providing their personal or banking information (credit card details or bank account details) to e-Commerce websites. Therefore, it is duty of the e-Commerce website owners to provide maximum security to these users.


Possible Security Threats for Servers and Databases

Hackers and cyber criminals have become more intelligent nowadays. For them, breaking any type of security takes just a couple of minutes, if the network is not properly secured. The most harmful threat is possibility of stealing crucial data from online servers.

In last few years, several cases of internal security violation have come into limelight, where employees were responsible for stealing or sharing data with external entities for their personal benefits. The resultant is that, nowadays not only external security is important, internal threats also can't be overlooked.

Other major security issues are protection of crucial data from viruses, Trojans, and malwares. Protecting servers or databases from being crashed is also a tough but essential task for network administrators.

Security Solutions

Nowadays all software manufacturers give proper attention to security. Modern Operating Systems and Database Management Systems come with inbuilt security features. Security features like Firewalls and basic security from viruses are in-built with all modern operating systems. Databases also have fault tolerance and integrity features, different kind of locks impose access security to database.

To ensure maximum protection from any kind of vulnerability implementation of physical security as well as application security is required. Physical security can be ensured through restricting access to crucial areas for only authorized people, round the clock close circuit monitoring, and employing security personals. For Application Security, one has to adopt latest Antivirus Software, Firewalls, Intrusion Detection Software, as well as strict passwords.

However, nothing is enough to provide you permanent security from intelligent but destructive cyber criminals. Therefore, regular assessment of security systems is very important to maintain complete protection of your crucial data and information.

Techno: Nokia to Build Factory in Indonesia

VIVAnews - Three cell phone manufacturers of global,

regional and local scales will build factories in Indonesia.

"One of them is Nokia," Director of Telematics of the Directorate General of Transportation Means Industry and Telematics at the Department of Industry, Ramon Bangun, told VIVAnews last week.


According to Bangun, Nokia of Singapore has conducted survey and observation of the business climate in Indonesia. "It's still at a very early phase" he said. Therefore, amount of investment has not been discussed.

Nokia of Singapore has requested data concerning the terms and conditions to invest in Indonesia. "They are in serious stage with regard to studying the governmental regulations," said Bangun.

Afterwards, said Bangun, Nokia of Singapore will discuss the results of its survey and observation with Nokia's head office in Finland. "They said they are interested in our conducive regulations," he said.

In addition to having interest in conducive business climate, Nokia is also intrigued by the large Indonesian market. "This year, it estimated that [the sales] will be between 15 and 20 million units," he said. By virtue of the large market, it will be easier for Nokia to distribute its products. "Transportation costs may be reduced because distribution processes to other regions are easier," he said.

However, Nokia's main reason to set up a factory in Indonesia is a policy on import restriction imposed through Trade Ministerial Regulation No. 60/2008 on Provisions of Certain Imported Products. As of 1 February 2009, importers of electronic products must both register as registered importer and carry out verification in the exporting country.

"It will certainly require additional costs," said Bangun. Therefore, he said. it will be better if the products are manufactured in Indonesia because the products have slight margin.

Translated by: Bonardo Maulana Wahono

How easy Registry Cleaner

With so many registry cleaners out now, it's difficult to know which ones are safe to use, and which ones could potentially harm your computer. The problem is very big, with the use of your computer hanging in the balance... and luckily, we've found a registry cleaner with no risk attached.The problem with so many registry tools is that they simply aren't safe to use. By "safe", we simply mean that the cleaner will make your computer run a lot better without the fear of it breaking or becoming ruined. All registry cleaners scan through a part of your system known as the 'registry'.


This the central database where Windows stores everything from your latest emails to your desktop wallpaper. It's where your PC keeps your most important files, and is a very delicate area of your system.A registry cleaner will go through this database and fix any problems that are in there. It will actually scan each file and then replace or fix it if it is corrupt... which means that the cleaner you use needs to be safe to use. The problem with many cleaners is that they simply aren't careful enough in the registry. They try and remove as many files as possible, which can have drastic effects for your PC.Because so many critical files (such the ones which tell Windows how to load up & log you in) are kept in the registry, it's important that your registry cleaner keeps well away from them at all costs. And this is there the problems arise - many cleaners don't do that, and simply jump in and remove as many files as possible.That's why we always stick to using a registry cleaner called RegFresh to make our clients' PCs quicker and more effective. RegFresh is a relatively new tool, only being released two months ago... but it's already created a huge storm on several popular download sites. It's becoming so popular because it actually uses a lot of highly intelligent technology to make it able to pick out and fix more problems than any other registry cleaner, allowing it to also leave the other important files alone.

GUEST BOOKS

PLEASE GIVE YOUR COMMENT, BUT DONT' BE SPAM. THANKS




ShoutMix chat widget

CONTACT ADMIN

IF YOU WANT TO CONTACT ME :
THIS 'S MY email : email.amalia@gmail.com