Review Gadget

descriptions of all the gadgets specification.

12

Mobile Application Helps Sight


There is good news for you who have limited vision capabilities. Changing technological sophistication of cell phones are not just a communication tool, but also a tool to view.

For example application entitled Looktel. Mobile phone application is capable of issuing the notification in the form of sound by the mobile users. Notification object describing the voice of objects in front of the point of smartphones.

Interestingly, a handset that uses LookTel can also be trained to recognize new objects. Stay directs the handset to the next object while you record your voice that contains descriptions of the object. LookTel will identify objects and then sends the image object to LookTel's Base Station or the library belongs LookTel complete. After drawing dikenah, information was then sent back to the handset.

LookTel applications compatible with Windows Mobile smartphones and handsets that use the touch screen. LookTel released by IPPLEX / iVisit, a technology company based in Santa Monica, United States.

Apple's ex-boss


Steve Wozniak once again made fun of Apple products, the company that dirikannya own with Steve Jobs. But, not Woz unique if not acted like that everyday though still loyal to Apple's devices. This time a prototype fourth-generation iPhone which became the target object.

Not long since a prototype fourth-generation iPhone on the internet because diguncingkan leak in the street, Steve Wozniak was photographed in the style of drinking beer and carrying the iPhone. T-shirt he wore that read, "I drank with Powell and Gray that I get is just a prototype iPhone that bad." The photos are as reported by CNET Woz sent to his colleague, and Sokol, a software engineer close to him.

Gray Powell is an Apple software engineer who was accused as the source of leakage of the iPhone prototype. He left the device in a toilet bar in Redwood City, California, while drunk. Visitors who find the goods and then submit it to the tech site Gizmodo is willing to spend 5000 dollars for it.

Gizmodo launched shortly after the alleged goods prototype fourth-generation iPhone, Apple deliver a written demand to return the item is claimed as his own. Until now, no confirmation of whether the goods are correct prototype latest iPhone.

Gizmodo investigation results, these devices use components that use the iPhone. The shape is slightly different with the iPhone with its back flat and the surrounding metal casing. On the sides there are also metal buttons from the iPhone is not like that only has one button on the front. camera behind the two main parts and an additional front.

Working Android on the iPhone


Create a hacker, saying "There's A Thousand Roads to Rome" it's always true to penetrate the barriers of technical computing system whatsoever. Including through the Apple iPhone to be able to run the Android operating system made by Google.

A member of the iPhone-Dev team, who called himself Planetbeing, managed to do so. Android video showing the work in the iPhone showed on YouTube. iPhone Dev is a notorious group of hackers who tamper with the Apple's smartphone. Planetbeing also the same people who embed Linux 2.6 kernel in the iPhone in the year 2008.

In the video, the Android software that is used and the actors seem a simplified version called Alpha version. However, if the software Planetbeing show can already play music, browse the web, and make calls from your iPhone without any problems. The only button on the iPhone functioned as a phone call button and menu button.

In his blog, Planetbeing states, the trick only works on first generation iPhone. However, he believed, to do so to the latest version of the iPhone only takes a few steps away. Create a fellow lover of Android and the iPhone is also interested in tinkering, he also provides guidance and do it for free. Wanted?

Securing Mobile Data


Features cell phone (mobile phone) which contains more complete has been the role of a tool that is increasingly vital. In fact, like a laptop or notebook, many people have used mobile phones, especially the types of smartphones, as an everyday working tool.

As a result, the phone also becomes a store of a variety of important data. Not only the personal data such as account numbers or passwords phone banking, data was frequently tersimpang work in it.

Viewing these developments, of course, a safety feature phones increasingly important. Therefore, securing the phone not only physical but also securing their data.

This security feature is also becoming more important because the higher the risk of losing your phone. As an illustration, in a safe country like the UK alone, the rate of loss of mobile phones reached 228 units per hour.

Currently, most data security standard in all phones is the Personal Identification Number (PIN). For the data contained in the SIM card, such as address book, there is a PIN from the operator.

There are three keys that can be used for free. This is the identity of a safety device, commonly called the IMEI (International Mobile Equipment Identity). If the analogy with a car phone, the IMEI number is a kind of machine.

The operator can detect the IMEI of phones that use their SIM. On paper, the legitimate owner of the phone could have asked all operators to block certain phones with IMEI numbers.

But these free keys spelled easily penetrated. Even the keys that are based on the IMEI though. "Thieves can change the IMEI because it's his existing tools," said XL Mobile Data Content Management Services, Arief Agus.

So, those who are fond of storing important data on mobile personal-nan, would require extra safety.

Closing the data access

Currently, there are many security applications are made to third parties. There are free and no pay. Sure, its not free to have features that more robust and diverse. The price of a package of mobile data security, ranging from 30 to 40 U.S. dollars.

Pay a fairly complete application, among others, Kaspersky Mobile Security 8 that works on top of the Symbian operating system version 9.1, 9.2, up to 9.3. There is also a similar product aimed at mobile phones that use Windows Mobile operating system series 5.0, 6.0, and 6.1. Kaspersky price tag of the artificial application of this 30 dollars.

Other software can be used for mobile data security as PhoneBAK2U, Phoneback Mobilephone, Security Genius Phone Guardian, Mobi Guard, Ultimate Theft Alert V3, Lookout, or Mguard Theft Recovery.

How it works is relatively simple applications. If the SIM card is replaced, the phone will send messages automatically to an emergency number, which has been determined in advance by the owner of the phone. Rightful owner can close access to various data on the phone with his reply to the automated message.

Other famous applications here is BAK2U. XL Axiata BAK2U had worked together to provide extra security for our customers XL BlackBerry service.

So, customers who take advantage of the extra security could perform data backup and do block when the handset is lost or stolen.

Brain Game, Not Making Smart


Latest research results show the game that challenges the ability to remember, logic, and other brain games do not make people become more intelligent. Thus the conclusion of research conducted by researchers at the UK Medical Research Council.

Study involving 11 430 people in the UK that found that brain exercises with games like that fail to improve the ability of brain function in general, including IQ. Both are doing exercise regularly or who are not the same.

"If people feel comforted when to play it, do it. But if they want to be more clever, do not expect," said Adrian Owen, a researcher from The Cognitive and Brain Sciences Medical Research Council UK as reported by BusinessWeek on Wednesday (04/21/2010).

These findings argue with the lure of dozens of software brain games for children or elderly that promise improvement of brain function. According to him, the results of research that has been published in the journal Nature concluded that the purchase of such software is a waste of money.

"You might be better to read a book or learning a foreign language rather than throwing a lot of money for a brain training like that," said Owen. In fact, continued Owen, the Internet provides a wide range of information sources is enough to crammed into the brain with new information.

Japan Develops Electronic Tool Mind Reader


Within 10 years, engineers and industry players in Japan's ambition to create a new generation of electronic devices equipped with a mind reader machine. Such tools allow panggunanya playing games or with his mind control device.

Actual mind reader technology is not new. However, the biggest challenge for consumers is practicality menghadirkannya into a user interface that mediates the brain signals with a computer system.

The device comes in as many science fiction films will utilize technology signals the brain to a machine translator. The technology is capable of analyzing the human brain waves and blood flow pattern detected by the sensors mounted on the head and other limbs.

The final form of the device that was developed among others, a television that can be operated without using the keypad or the phone can send SMS without having to be typed. Other applications may be used in car navigation system that will find the nearest restaurant if users are hungry and AC that will adapt to the user's body temperature in the room automatically. Robot can also assistant who knows the needs of seniors and help bring the User needs.

Joint research initiative to develop a product ready to be marketed in 2020 it has started early this year for the support of government and private. As quoted by the Nikkei newspaper, Japan, some large companies are involved including Toyota, Honda and Hitachi. While the research institute that supports, among others, the National Institute of Information and Communications Technology, Osaka University, and the Advanced Telecommunications Research Institute International.

Beware, Intel Core i7 Processors Counterfeit Supply


News about software piracy may not be a new thing, but if new hardware like the processor's hijacked warm. Moreover, counterfeit processor is Intel's Core i7-920 which is the company's new flagship product is the largest processor.

Friday (05/03/2010) last week reported that HardOCP site of one of the members of its online forums. Rapporteurs who bought the processor from Newegg, one of the online stores in the U.S., rather than getting the desired processor but a processor box contains the following fake savings and fan pelincung printed from a plastic material.

Fake processors were sold in special packaging and contains a manual but blank pages. In addition, the sticker on the outside there are a lot of the pen, as they should be written sochet socket.

There has been no explanation of how counterfeit goods are made similar to the original packaging can be circulated. Newegg reported directly replace the original items that have reports, but have not yet ascertained how many consumers are deceived.

"Intel is very concerned with the possibility of counterfeiting i7-920 package on the market and are trying to identify how many and where dijualbelikan," said Nick Jacobs, spokesman for Intel as reported by PC World, Monday (08/03/2010).

He said buyers who felt cheated by such products are required to report to the stores that sell them. If not enough, consumers were asked to report to the authorities. It needs to be careful to buy a processor that cost it millions.

Genius Launches New Computer mouse


In the midst of competition additional devices (peripherals) that are highly competitive, one digital device manufacturers, Genius, launched the mouse (the mouse) to date. This mouse named Mouse Navigator T835.

With the various facilities offered, Kye Systems Corp. says that this mouse is very cheap but high quality. "Compared to similar products from China, the mouse is more expensive than we did. But we have a product that is more durable and more reliable," said Paishan Lee, Kye Systems Corp. vice president, when launching Mouse Navigator T835 in Manchester United's Café, Jakarta , Friday (03/26/2010).

Facilities offered by the T835 Navigator Mouse, among others, wireless systems with 2.4 GHz technology, micro receiver with a resolution of 1600 dpi, and a multifunction laser also can be used in a presentation purposes. In addition it also uses the mouse scroll or scroll-touch system touch, which is claimed to be able to shorten the time of the user when surfing the Internet.

"When compared with our competitors who offer similar facilities, our product prices very competitive, and cheaper. Moreover, we also provide extensive services across Indonesia," added Wildan Siregar, from CV International Trading. Prices of new mouse from Genius, the dibandrol starting price 60 dollars.

Now Equipped Swiss Army knife Memory Stick


For the first time-made Victorinox Swiss Army Knife equipped with a memory stick, not only knives, scissors, and other tools. In addition, the memory used is very safe and claimed impenetrable to hackers.

I was so confident, Victorinox up to £ 100 000 reward for anyone able to penetrate the security system of the memory stick when the launch in London last week. However, apparently no one was able to do it.

Memory Security is indeed multi-layered, ranging from fingerprint identification, body heat sensors, up to AES256 encryption. Also added use of the Platform Schnuffi on a single chip technology patented by Victorinox.
Knives that are named Secure Pro is available in 8 GB memory options with up to 32 GB worth between £ 50-180. In addition to a memory stick, tool is in it, among other things, a white LED as a marker, knives, pens, scissors, nail clippers, screwdrivers, and chains.

Prototype iPhone


Prototype iPhone that is leaking because the left in the bar when an employee brought Apple has many new features. Some changes are also made in terms of appearance, materials, and components.

Jason Chen from Gizmodo tech site that could not only lead by the atiknya memamerkna forms and photos from various sides. He also revealed parts of goods which allegedly had a prototype fourth-generation iPhone in detail after dismantling the component for component. Here are some points worth noting from these prototypes.

New Features
1. The camera on the front that can be used for video chat.
2. The main camera lens on the back is bigger than the iPhone 3GS.
3. The camera has a flash.
4. Using a micro-SIM card smaller than a standard SIM card.
5. Better screen resolution.
6. Button to set the high-shear low voice.
7. The power button, mute, and volume of metal.

Change
1. The rear part of the curve is not flat and polished hard materials.
2. Aluminum wrap around it.
3. Screen size is slightly smaller than the iPhone 3GS.
4. Weight 3 grams lighter
5. Battery size 16 percent larger.
6. Electronic components smaller.

Basic Specifications
1. Size 4.5 x 2.31 x 0.37 inches.
2. Weight 140 grams.
3. WH 5.25 3.7 V. Batteries
4. XX GB hard drive capacity (not to be measured).
5. The operating system was not tested because Apple hurried off from a distance.

Will Eric Decker be the 2010 S.O.D?


Former Minnesota Vikings running back, Onterrio Smith produced very little over the course of his career on the field. But that doesn't mean Mr. Smith didn't give back to society before his career came to an abrupt halt. If we were playing word association and I said "Onterrio Smith", I'm sure for most of you "Whizinator" is what immediately comes to mind. But let's not forget that Mr. Smith also gave us the term, S.O.D. which of course means Steal Of the Draft.



Which brings me to the point of this post. Will Eric Deckerbe the 2010 S.O.D.? Projected as a possible late second round pick, Decker wouldn't exactly qualify as a steal if he were to be drafted in the top 64 picks. At that point he becomes someone teams and fans will be expecting production from in 2010. But assuming his 2009 injury causes some concern among NFL executives and he falls into the third round, expect one lucky team to get great value with their selection of Eric Decker.

Like every other player expected or hoping to be drafted this weekend, Decker has some strengths and weaknesses. It comes down to Decker is the kind of player who grades out very high on intangibles and is a notch below many of the top receivers when it comes to the measurables. So lets take a look at each of these...

Measurables

Height - 6'3"
Weight - 217
40-time - 4.54 (approximate)
Bench - 15 reps at Combine

Decker is actually very solid in his measurables, he just doesn't stand out. He has very good size though guys like Dez Bryant and Demaryius Thomas are slightly bigger. He has good speed but guys like Golden Tate and Arrelious Benn are faster. And he is a strong receiver but guys like Damian Williams, Benn and Tate put up more reps when benching at the combine. Nothing about Decker stands out as red flags when it comes to measurables and conversely none of his measurables jump out as a compelling reason to draft him early.

As you can see Decker is strong, he is fast and he is big. What he isn't is the strongest, fastest or the biggest. What Decker brings is a very nice combination of size, speed, strength and grades very high when it comes to intangibles.

Intangibles

After talking about size and speed we move into the areas where Decker will really stand out. When you read draft profiles of Decker you read a lot about his toughness, leadership, route-running, hands and intelligence.

I'm going to start with toughness and realy I could probably end with toughness after you watch this video.

This was a great catch, be sure to wait until about the 48 second mark when they replay in slow motion. Another video here discusses the physics of the hit he took and how remarkable it was that he actually hung on to the ball. It should be noted that he came back and played that game despite getting his bell rung shortly before halftime.

On top of his toughness, Decker is a smart young man which translates and becomes evident on the football field. Despite doing well and earning accolades as a student at the University of Minnesota, Decker also recorded the highest score on the Wonderlich Test at the NFL Combine. A two-time Academic All-Big Ten performer and he earned a National Football Foundation Scholar-Athlete Award last year. It should also be noted that Decker changed offensive coordinators and playbooks nearly every season as a Gopher and managed to remain productive while others clearly struggled to pick up the complexities and nuances of the new systems.

The video evidence gives is a concrete example of Decker's "toughness" and his intelligence has been thoroughly measured. Many of the other intangibles are hard to quantity (which is why they are intangibles) so I'm going to turn to several draft profiles of Decker to illustrate the other areas where he demonstrates excellence.