Review Gadget

descriptions of all the gadgets specification.

12

Securing Mobile Data


Features cell phone (mobile phone) which contains more complete has been the role of a tool that is increasingly vital. In fact, like a laptop or notebook, many people have used mobile phones, especially the types of smartphones, as an everyday working tool.

As a result, the phone also becomes a store of a variety of important data. Not only the personal data such as account numbers or passwords phone banking, data was frequently tersimpang work in it.

Viewing these developments, of course, a safety feature phones increasingly important. Therefore, securing the phone not only physical but also securing their data.

This security feature is also becoming more important because the higher the risk of losing your phone. As an illustration, in a safe country like the UK alone, the rate of loss of mobile phones reached 228 units per hour.

Currently, most data security standard in all phones is the Personal Identification Number (PIN). For the data contained in the SIM card, such as address book, there is a PIN from the operator.

There are three keys that can be used for free. This is the identity of a safety device, commonly called the IMEI (International Mobile Equipment Identity). If the analogy with a car phone, the IMEI number is a kind of machine.

The operator can detect the IMEI of phones that use their SIM. On paper, the legitimate owner of the phone could have asked all operators to block certain phones with IMEI numbers.

But these free keys spelled easily penetrated. Even the keys that are based on the IMEI though. "Thieves can change the IMEI because it's his existing tools," said XL Mobile Data Content Management Services, Arief Agus.

So, those who are fond of storing important data on mobile personal-nan, would require extra safety.

Closing the data access

Currently, there are many security applications are made to third parties. There are free and no pay. Sure, its not free to have features that more robust and diverse. The price of a package of mobile data security, ranging from 30 to 40 U.S. dollars.

Pay a fairly complete application, among others, Kaspersky Mobile Security 8 that works on top of the Symbian operating system version 9.1, 9.2, up to 9.3. There is also a similar product aimed at mobile phones that use Windows Mobile operating system series 5.0, 6.0, and 6.1. Kaspersky price tag of the artificial application of this 30 dollars.

Other software can be used for mobile data security as PhoneBAK2U, Phoneback Mobilephone, Security Genius Phone Guardian, Mobi Guard, Ultimate Theft Alert V3, Lookout, or Mguard Theft Recovery.

How it works is relatively simple applications. If the SIM card is replaced, the phone will send messages automatically to an emergency number, which has been determined in advance by the owner of the phone. Rightful owner can close access to various data on the phone with his reply to the automated message.

Other famous applications here is BAK2U. XL Axiata BAK2U had worked together to provide extra security for our customers XL BlackBerry service.

So, customers who take advantage of the extra security could perform data backup and do block when the handset is lost or stolen.

Brain Game, Not Making Smart


Latest research results show the game that challenges the ability to remember, logic, and other brain games do not make people become more intelligent. Thus the conclusion of research conducted by researchers at the UK Medical Research Council.

Study involving 11 430 people in the UK that found that brain exercises with games like that fail to improve the ability of brain function in general, including IQ. Both are doing exercise regularly or who are not the same.

"If people feel comforted when to play it, do it. But if they want to be more clever, do not expect," said Adrian Owen, a researcher from The Cognitive and Brain Sciences Medical Research Council UK as reported by BusinessWeek on Wednesday (04/21/2010).

These findings argue with the lure of dozens of software brain games for children or elderly that promise improvement of brain function. According to him, the results of research that has been published in the journal Nature concluded that the purchase of such software is a waste of money.

"You might be better to read a book or learning a foreign language rather than throwing a lot of money for a brain training like that," said Owen. In fact, continued Owen, the Internet provides a wide range of information sources is enough to crammed into the brain with new information.

Japan Develops Electronic Tool Mind Reader


Within 10 years, engineers and industry players in Japan's ambition to create a new generation of electronic devices equipped with a mind reader machine. Such tools allow panggunanya playing games or with his mind control device.

Actual mind reader technology is not new. However, the biggest challenge for consumers is practicality menghadirkannya into a user interface that mediates the brain signals with a computer system.

The device comes in as many science fiction films will utilize technology signals the brain to a machine translator. The technology is capable of analyzing the human brain waves and blood flow pattern detected by the sensors mounted on the head and other limbs.

The final form of the device that was developed among others, a television that can be operated without using the keypad or the phone can send SMS without having to be typed. Other applications may be used in car navigation system that will find the nearest restaurant if users are hungry and AC that will adapt to the user's body temperature in the room automatically. Robot can also assistant who knows the needs of seniors and help bring the User needs.

Joint research initiative to develop a product ready to be marketed in 2020 it has started early this year for the support of government and private. As quoted by the Nikkei newspaper, Japan, some large companies are involved including Toyota, Honda and Hitachi. While the research institute that supports, among others, the National Institute of Information and Communications Technology, Osaka University, and the Advanced Telecommunications Research Institute International.