Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

Monday, October 29, 2012

This Application File Sync Smartphone to PC Desktop

Microsoft Windows 8 hope tomorrow will be a great day and especially. Because the company prepares to launch a mobile platform officially makes. Therefore, to prepare lyrical Windows Phone 8, Microsoft has made an application synchronization for Windows 8 platform that can be downloaded legally via the Windows Store. Thus quoted from Softpedia, Monday (29/10/2012). 

The launch of this application shows that the company wants to strengthen the relationship between mobile OS and desktop platforms. "Your Computer and Windows Phone 8 works seamlessly with Windows Phone app, so you can take photos, videos, music and any other time you want," said the company on the application description. Meanwhile, the software is designed with support for x86 and x64 systems, and ARM. That way, applications can be run on all devices Windows 8 and Windows RT. 


As mentioned above, Windows Phone app offers seamless synchronization between the handset and a Windows PC. Here are the features offered by Windows Phone application: -Get music, photos, and videos from your computer to your phone (and vice versa) -With the rapid sharing of mobile phones with Windows 8 apps (like Photos or Search) -Automatically save photos and videos to your phone and your PC -If your phone is lost, it can mengnjungi WindowsPhone.com to mendownlod application and know the whereabouts of your phone. 

System requirements x86 x64 ARM Supported processors x86, x64, ARM 

Languages English (United States), Chinese (China), Arabic (Saudi Arabia), German (Germany), Spanish (Spain), Hindi (India), Japanese (Japan), French (France), Russian (Russia), Bulgarian (Bulgaria), French (Canada), Croatian (Croatia), Czech (Czech Republic), Danish (Denmark), Estonian (Estonia), Finnish (Finland), Greek (Greece), Hebrew (Israel), Italian (Italy), Korean (Korea), Latvian (Latvia), Lithuanian (Lithuania), Spanish (Mexico), Dutch (Netherlands), Norwegian (BokmÃ¥l) (Norway), Polish (Poland), Portuguese (Brazil), Portuguese (Portugal), Romanian (Romania), Slovak (Slovakia), Swedish (Sweden), Chinese (Taiwan), Thai (Thailand), Turkish (Turkey), Ukrainian (Ukraine), English (United Kingdom), Serbian (Latin) (Serbia and Montenegro (Former)), Slovenian (Slovenia), Hungarian (Hungary), Azerbaijani (Azerbaijan), Belarusian (Belarus), Catalan (Spain), Persian/Farsi (Iran), Filipino (Philippines), Indonesian (Indonesia), Kazakh (Kazakhstan), Macedonian (Macedonia, FYRO), Malay (Malaysia), Albanian (Albania), Uzbek (Latin) (Uzbekistan), Vietnamese (Vietnam) 

Accessibility This app has been built and tested for accessibility, making it easier for everyone to use. License agreement http://go.microsoft.com/fwlink/p/?LinkID=235358
MORE

This He Prospective Buyers First Tablet Microsoft Surface


For those of you who often follow the news about the development of technology, perhaps no stranger when you see hundreds of Apple fanboy who would stay at the front of the store to get the latest device made by Apple. This time, the Microsoft fanboy ever seemed to start following way, although not as much as Apple pengantre but the emergence of a fanboy who set up a tent in front of the store Microsoft is quite interesting. 


 CNET published a number of photos of young Chinese men were waiting in front of the store that sells Microsoft's Surface tablet. In the photo, she was seen in front of the tent which he founded while enjoying fast food snack. Thus quoted from Softpedia, Thursday (25/10/2012). Thanks to this action, a man named Chen Shi Surface opportunity to be the first tablet buyers all over the world. 

Where China will begin on October 26 faster than the U.S.. To note, some time ago Microsoft Store shows that the status of the order of the three models Surface been booked out. A Microsoft spokesperson said the Surface is now sold out in the United States. However, customers can still purchase the tablet at Microsoft Store outlets. "Surface is available online in eight markets around the world: Australia, Canada, China, France, Germany, Hong Kong, United Kingdom and United States. 

Availability online customize order and availability of the device. Apart from availability online, starting October 26, 2012 all three models Surface will be available in stores Microsoft's sales in the United States and Canada, including 34 new stores, "said Microsoft. To note, Surface at the cheapest price tag seems to be a prima donna among buyers (Microsoft fanboys), the article has been selling version ordered in less than 24 hours after the company released pricing information. Moreover, consumers who want to buy the 32 GB version without Black Touch Cover waited three weeks before devices are booked up on the buyer. The most expensive version is 64 GB with a lid can be sent just two weeks after ordered
MORE

Friday, October 26, 2012

Comparison iPad Mini with iPad 2, iPad 3 and iPad 4





iPad Mini provides a new choice for users who are interested in tasting tablet device made ​​by Apple. Tablet with 7.9-inch landscape display is sold at a lower price than traditional sized 10-inch iPad, which began 329 dollars for the 16 GB WiFi version only. That price comes with some compromises. Judging from their technical capabilities on paper, the iPad Mini is not as sophisticated brother, New iPad, which has also been updated with a number of changes to the hardware.


 Meanwhile, the tablet iPad 2, which has been circulating since the first quarter of last year will be retained in the Apple product line with the level of prices in the iPad Mini and New iPad (iPad 4th generation). Be consumer faced with three choices: Mini iPad, iPad 2, and New iPad (iPad 3 and 4). Each one comes with its own advantages and disadvantages. Well, to make it easier to choose the iPad tablet which better meet the needs, the following three price comparison following specifications tablet. 




MORE

Thursday, October 25, 2012

Wiretaps FOR CORRUPTION

Light conversation between two or more people can be the crucial evidence in an action kiminal. You must see for yourself how cases of bribery and tax mafia eventually be revealed by the KPK. Hmm, sound proof really powerful and authentic. suaraNah bugs, if you intend to immediately reveal the mischievous actions that are often harmful, just use two-way voice bug with GSM card. Super mini black box design, easy dikamuflasekan. Why is it called 2-way GSM bug?

 In another sound bug, you usually the one who had called GSM number attached to the device to listen to the details of the conversation taking place in the room where you put the tool. But not for this one, once detected a sound, the sound will automatically tapper contact you. Wow, more sophisticated is not it?  tapper mini measures just 4.2 x3x1, 2 cm, can be easily hidden anywhere without being recognized. Can be placed in the office as well as private vehicles, an important area of the reach of the GSM signal. 

The conversation that you hear via GSM bugs can also directly recorded on a cell phone and used as evidence. Not only that, tapping mini sound is also very functional as a means of monitoring children. Fitting for those who have teenage sons and daughters who are vulnerable to the ill effects of promiscuity. For those who like alarmed by the behavior of a partner, can immediately caught cheating with this tool you know. No need to bother anymore to hire a private investigator, let alone joining in the reality show? The contents of the package: - 1 unit GSM bug - 1 unit mini USB connector to a USB 2.0 - 1 unit adapter / charger
MORE

Wednesday, October 24, 2012

MacBook Pro 13-inch Retina Display Only 450 Gram Weighted Officially Introduced with Prices Starting from 22 Million

October 3, 2012 yesterday was really a big event for Apple. In addition to launching the iPad Mini and iPad 4, Apple also introduced formally MacBook Pro 13-inch Retina Display technology equipped The new MacBook has a thickness of only 5.19 mm, which is 20 percent thinner than the MacBook Pro 13-inch normal. In terms of weight, this MacBook also has a very light weight, which is 450 grams, about the same as the weight of most of the tablets on the market. The tablet comes with two Thunderbolt ports and two USB 3.0 ports. In addition, Apple also pinned SD card reader on this notebook. Apple uses IPS Retina Display screen on the MacBook Pro 13-inch. The screen has a resolution of 2560 x 1600 pixels with a pixel density of 227 ppi. The consumers can choose up to 768 GB of storage capacity and a Core i5 or Core i7. Regarding the price, the MacBook Pro 13-inch Retina Display with Intel Core i5 dual-core 2.5GHz (Turbo Boost up to 3 GHz), 8GB RAM, 128GB flash storage sold for 1449 pounds, or 22 million dollars.
MORE

Wednesday, August 1, 2012

flash disk could be a ram.

You got a problem on your RAM memory? If a small RAM memory then your computer automatically, too lambat. it usually makes people buy new RAM but do not have money. If the problem you're rich so I can provide the solution. you have a flash right? time now many people who have flashdisk.also getting cheaper here I will provide juggling tricks FLASH DISK into RAM. If you do not have FLASH DISK you can use Hardisk how do I continue to conjure? mudah.hanya how to use a single application only. Please download below file name: eBoostr.zip file size: 1018.07 KB password: petruks.hexat.com download: http://www.ziddu.com/download/2915315/eBoostr.zip.html
MORE

Saturday, October 15, 2011

invisibility software hp

Programs Invisible | Invisible Software - Is all of my friends had never heard the term program or software invisibility invisibility? Perhaps for those of you who have often read this information in various media may not be too familiar. But for those of you who have never heard of, so in this article I want to discuss it as an addition little information to us about the world of technology, especially about the invisibility of this program. Program or a more opaque term is called as a software invisibility is the software used to run the hardware functions, namely the camera. Usually this type of software there are various mobile phone. The reason is because its placement on the phone as we know it today every phone must have a camera, so the software through the desert with a Mobile Camera with each other to support each other. This type of camera with translucent programs commonly referred to as the infrared camera. Type of this camera has advantages for capturing an object, even though the object is blocked by a barrier such as clothing worn. In physical terms, this type of infrared camera equipped with a see-through programs are not much different with mobile phone cameras in general. However, to run the camera like this, already supported by specialized software known as a software invisibility, where then the camera will capture function object that has a barrier. With a blend of hardware and software, then an image of the object behind the barrier can be obtained. One way is to use a camera of this type can see a person's body covered by clothing. Concerns with the release of the software is of course the invisibility felt by many people today. Why not, since the presence of devices that fall into the hands of ignorant, of course, will happen abuse irresponsible. Step Anticipation Although many outstanding software this invisibility, but you need not worry too much. Because there are several steps that can be done to overcome them. The steps that must be done to address the program's invisibility among others by: 1. Always wary of strangers in public places someone who tried mengharahkan camera to you. 2. Dress properly, that means you should avoid wearing clothing that is thin, except if it is required in certain circumstances. If indeed you must wear thin clothing, so make sure to wear a thicker coating. 3. If you are in a place that is prone to the occurrence of theft of images through a hidden camera, so make sure you are always on the location of the dim light. With the state that are less bright, then the results obtained photos and video from the hidden camera will be less optimal. That's the quick explanation of the Program or Software invisibility invisibility. Hopefully this information can give somewhat enlightening to you, especially for those of you who are less comfortable with the existence of programs of this invisibility.
MORE

atm hacking

A scientist has revealed the hacker-style sniper tips on how to hack a chip-based ATM card which he breached anti super safe. Apparently nothing is safe in this world of yes. To be more secure, ATM cards are expected to be substituted into the chip-based systems. However, a security researcher was already managed to find a method of breaking into the chip-based card. The results were disclosed in the annual Black Hat Conference that was held in Washington DC, United States. This discovery is quite horrendous as the previous chip-based system is considered to be very, very safe and almost impenetrable. Is a researcher named Christopher Tarnovsky of Flylogic Engineering who managed to find a way to break the chip-based cards. He also revealed weaknesses that technology to the public. Tarnovsky managed to break into chips Infineon SLE 66 CL PE-called widely used in computers, gaming systems, identity cards and other electronic items. However, as quoted from DarkReading, Tarnovsky presented method is quite complicated and expensive. "I did not say it was cheap, but the technology is not as secure as touted in the vendors," said Tarnovsky. The process is carried out Tarnovsky in breaking into the chip card is quite complicated. That process requires an analysis by electron microscopy, create a 'map' to penetrate the security of the card and then stick a needle is super smooth to get the data in it. Breakdown of chip card security does not mean that efforts to replace the ATM card into this technology need not be continued. This is because the method of breaking into the chip card is much more complicated compared to break the security of magnetic stripe cards with a 'simple' like a skimmer. Tarnovsky claimed methods can be used also to break the chips made by another vendor atm. As a form of responsibility, Tarnovsky had already been informed of this method at Infineon, as the chip maker, and Trusted Platform Module (TPM) security chip as standardization organizations. In breaking the chip Tarnovsky takes over nine months and spent hundreds of dollars. "It takes a long time not because of what the vendors, but because I am still learning how. Once you know how, would not that difficult anymore," Tarnovsky stressed. detikinet. safety tips trick hack atm card collapse chips atm by hackers. Then how to cope or perform preventive measures against the action of ATM burglary? IT forensic experts interviewed by reporter Metro TV at the time, had jawabaannya. This is the tip-tips: Note the entry hole ATM card, is there any incongruity, if for example there seem solatip and others, we rightly suspicious and reported this to the bank officer concerned. Look around us, whether there are any suspicious objects like cameras (but not the CCTV cameras, usually as I see it in the Metro, placed surveillance cameras in place that leads to the ATM keypad. Change your PIN periodically us, it's for our safety. Try to cover with our hands when we take the money, it meant that our PIN is not readable by the person next to or behind us. Note also the area around the hole where the entry of ATMs, whether visible or not there is incongruity. He said if there were, the holder hole gkita ATM, then we should be suspicious, there is a villain who intends to spy on our ATM users. Okay, buddy. Hopefully this info useful ...
MORE

crt vs lcd monitor


Which one is better CRT or LCD? Today many manufacturers of monitors that are not producing the type of CRT monitors, the reality on the ground almost the entire package of computers sold are always mengincludekan LCD as a monitor. But we still have to understand what the difference is CRT and LCD. what the pros and cons? If you open Warnet, which is better? Whether your monitor is suitable for your application? Here's short comparison. The major advantages of color CRT monitors are renderingnya. CRT has the highest contrast and sharpness of color which is well above than the LCD. While many in improving the quality of the LCD that is increasingly increases the sharpness of the color and the level of CRT masi contrastnya but winning in this case. Many of the Graphic Designer who are willing to buy a CRT monitor with a large screen where the price is certainly very expensive, this was due Graphic Design requires high-quality color while not denying that the CRT has a life where the quality will deteriorate over the lifetime of the tube in the monitor. Another advantage is the CRT has the ability to change resolution easier. This is because MultiSync technologies, with a set electron beam inside the tube, the screen can be easily reduced without damaging the image resolution. Although two advantages TSB make enough in interest to the CRT, but CRT has a great evil that is also a relatively large size with a weight far greater than the LCD. Comparison of weight and size of the CRT and LCD up to 80%. In addition CRT also has a weakness where large electric power-consuming, require electrical energy in the electron beam within the tube so that the monitor get the highest heat more than the LCD. LCD Monitor The main advantage of LCDs is the size and weight. As explained previously, the size and weight of the LCD can be smaller or up to 80% lighter than CRT and this allows you to use a large screen without difficulty. Also LCDs are also safer for the eye which, if compared to CRT which uses a lighted tube can cause eye strain and fatigue on the user. Behind its superiority, the LCD has a weakness which has a static resolution, LCD display can only display the number of pixels in accordance with his ability could not be more and less. Video became one of the main problems of the LCD which has a slower response than CRT. Although LCD technology has a lot of development, sometimes several products masi experiencing the same problem. Of course, buyers should be cautious in choosing LCD monitor products. Despite having differences and advantages and disadvantages of each, the LCD remains the main option at this time. Where electricity has an important role in the selection of LCD products. Although the price of LCD is much more expensive than CRT, long-term use can make the CRT can be more expensive because you would use more electricity. Roughly speaking, willing to invest to buy an LCD or investments would pay for expensive electricity to PLN?
MORE

maximize vga

Overclock has now become a trend among the PC Gamer. Game demands a high specification and thirst for resources, making the pc gamers would not want to overclock the VGA in order to get them a better quality game. Well what overclock it? Mmm ... jelasin also confused on this one ... but the language easily, overclock it is the process of making work a VGA (Graphics Card) you higher and faster than the previous conditions. The producers actually make this VGA VGA with good quality and can be maximized ... only then VGA is set by the manufacturer with a standard speed which will live longer. Loh .. why should the standard be set? It can be maximized? VGA is adjusted to set the standard for refrigeration. If the coolant used to the VGA must be set at normal speed so as to be durable. If the VGA is set to maximum with ordinary coolant, it will cause the VGA to be very hot and of course quickly broken. Yes heat is the enemy of the VGA. Not all dimodali VGA with overclock facility. Usually dimodali VGA with overclock facility has a thick cooling and also the default application to overclock overclock so it can ease the process earlier. And what about that do not dimodali facilities VGA overclock? Is it still can be overclocked? The answer is YES, RivaTuner will answer how to overclock your VGA, VGA though you are not included in the overclocked version. RivaTuner has a very complete facilities and great Freeware application alias is Free! By using this RivaTuner you can set the speed and memory capacity of your VGA. Also RivaTuner can also adjust your VGA fan speed! WoW .. I must admit Maniax pal gamers .. software of this one was great! Well now we try to overclock VGA our favorite: 1. Download RivaTuner. 2. Install RivaTuner and Extract at any place (Keep a folder with RivaTuner) 3. After extract is complete, open the folder and extract the Install RivaTuner 4. Click Next until you find it wrote to confirm the update, and select No and Next again 5. When finished installing, restart your computer 6. Run RivaTuner application and wait for the registry to complete the generation process and click OK. 7. On the Main tab, click Customize on the ForceWare Detected arrow and select the image that most left corner (System Settings) 8. In the Overclocking tab and check the box Enable the drive-level hardware overclocking and click Detect Now. 9. Now you see the status and speed of your VGA are currently running. Replace standard 2D with 3D performance. 10. Raise bit by bit Core Clock and Memory Clock (25-50 MHz), then save and apply. 11. Select the Fan tab, change the auto control with direct control. Move the fan to the percentage of 60-80%, then save and apply. 12. Now you try to play games that are sufficiently weighted (3D) to test whether the overclock successfully. If successful try raising again the Core Clock and Memory Clock bit by bit and if it does not work, try lowering the Core Clock and Memory Clock bit by bit as well
MORE

Secrets Behind the Pieces CD


CD media is no longer strange stuff. Many people who often play around with CDs for various purposes. Some are making photographs in the studio and the picture is stored on the CD, there are songs that make the album and the result is stored in the CD, there are also making films and the results are also stored on CDs. Tool for recording CD price is more affordable. Not until a half million dollars we can buy a CD recorder, or better known as the CD Writer. CDs were much cheaper price than floppy disks. With a price of about 1500-2500 dollars we've got the magic plastic dish. TYPES disc Disc we meet the market, basically divided into 3 groups. Ie CD-ROM, CDR and CD-RW. Each of these CD type has its own characteristics. CD-ROM Stands for Compact Disc - Read Only Memory. CD-ROM disc is colored silver. The manufacturing process is by placing a sheet of plastic film that has been irradiated by a laser beam. The laser beam that will form a kind of pit (hole) of micro-sized - which is very small. The holes that will form the contents of a row of code data. Once a hole is created, it can not be closed again. Then a layer of plastic that will be wrapped again by liquid plastic that is useful as a protective and reflective. All of that process is done gradually in a molding machine. CD-ROM tool mold shaped like a cookie cutter analogy martabak making sweet and also very similar. More details see image below; it is no wonder if the given name of the ROM (Read Only Memory). Data in the CDROM can not be deleted so that the CD-ROM can not be erased or recorded on an ordinary CD Writer tool we have. The quality of the CD-ROM is determined by the third layer. Reflective layer must be able to reflect light emitted by a laser beam with perfect that the information in the data layer can be read properly. While the protective layer should be strong so that the data layer is not damaged by scratches or dirty. CD-ROM are generally more durable than the original CD-ROM pirated. Because the quality of the layers on the original CD-ROM is very strong and qualified under the manufacturer's quality can stsobatr disobatlkan. However, it was likely there is also a CD-ROM-quality pirated, but of course the price is not cheap.

CD-R Stands for Compact Disc - Recordable. CD-R discs are generally green, but there are some that are blue, red and black. The manufacturing process is similar to CD-ROM, that is by placing a sheet of plastic film. The difference is that the plastic sheet has not been irradiated by the laser. Then a layer of plastic that will be wrapped again by liquid plastic that is useful as a protective and reflective. Then when the plastic sheet that will be illuminated laser? The answer later on when we want to record it. That is why CD-R is also called the CD-Blank because it is still empty. Determine the quality CD-R is also equal to determine the quality of the CD-ROM. But there should be extra attention, namely because the recording process is done after CD printed and there are so many CD-Rs sold in the market, then the quality of the data sheets on the CD-R it should match with his CD Writer. It used a lot of cases, apart from the problem of Buffer Under-Run (run out of supply data), formerly CD Writer is able to recognize that the data layer as well. Buddy does not need to worry, today's CD Writer is able to recognize a variety of CD-R in the market. To be sure, my friend should read the manuals for information a list of CD-R the most optimal for CD Writer buddy. For my friend who still uses an old-fashioned CD Writer, please visit the manufacturer web site to update the firmware. The usefulness of this firmware update CD Writer to help identify the layers of data. Even in some particular CD Writer, with only a firmware update we can improve the speed record without having to buy a new CD Writer. Quite right. CD-RW Stands for Compact Disc - rewriteable. CD-RW discs are usually purple. The manufacturing process is similar to CD-ROM or CD-Rs by placing a sheet of plastic film. The difference is the plastic sheet that has the ability to open and close. As already explained that the data layer when illuminated by the laser will make the holes as a code. On the CD-RW data layer that can be the holes can be closed again if needed. That is why we can record and erase CD-RW media is our heart's content. CD-RW not carelessly can be read on a CD Player or VCD player. To be able to read CD-RW takes power laser beam is stronger than usual. Therefore make sure that the CD player or VCD player supports CD-RW pal. CAPACITY CD The capacity of a CD can be classified into 2 physical form. First a small disc of diameter 8 cm, and a second disc with a diameter of 12 cm normal. Small 8 cm CD capacity, capable of storing up to 21 minutes or the equivalent of 184.57 MB. The question is, how to know 21 minutes each with 184.57 MB? That is what will be discussed here. CD recognize two kinds of modes, namely Mode 1 and Mode 2/XA. In Mode 1, the CD will be formed with a size of 2048 bytes per block. The number of blocks depending on the size of a CD. For the 8 cm CD has a 94 500 block. So if we multiply 2048 by 94 500 193 536 000 Bytes same result. Change the number bytes into megabytes (MB). Since 1 MB equal to 1,048,576 Bytes, then the result is 184, 57 MB. In order to more easily understand it, see the table below; The question arises, why the number of blocks each different mode? The reason for Mode 1 is used to store data. While Mode 2/XA used specifically to create CD-Audio or VCD. There are fundamental differences between the data with video / audio, which is the data used as a benchmark is the capacity in units of MB. But in the video / audio benchmarks used are based on seconds. These differences in the capacity of many tricks used by some people to do the overburn technique. By overburn we can store more data than usual, this technique is not recommended for beginners because it may cause damage to the CD-Writer drive if done asalasalan. Regardless of all that, MPEG-1 files sized up to 780 MB can be stored well if you put them into VCD, not as ordinary data files. Moreover, by making a VCD, you can watch not only in PCs but also on a VCD player.
MORE

Friday, October 14, 2011

History and Development of Computer Technology Tablet

Tablet computer is a complete computer entirely with the touch screen flat. The main distinguishing feature is the use of the screen as the input device using the stylus, digital pen or fingertip instead of using the keyboard or mouse. Microsoft introduced a version of Windows XP for tablet computer called the Tablet PC in 2000, while the newly launched version of Apple tablet computer in 2010 with the name iPad. In 2011 Samsung launched the Galaxy Tab tablet computer versions 8.9 and 10.1 (P7100) Tablet PC is a laptop or portable computer in the form of books. Having a touch screen or digital tablet technology that enables computer users to use a stylus or digital pen than a keyboard or computer mouse. The term was popularized by Microsoft in 2001, but the tablet PC now refers to any tablet-sized personal computer, even if not using Windows but other PC operating systems. Tablets can use the virtual keyboard and handwriting recognition for text input via the touch screen. RAND Tablet found. RAND Tablet is better known than Styalator, but were created later. Alan Kay of Xerox PARC proposed a notebook computer, can use pen input, called the Dynabook: however the device was never built or implemented with pen input. Software system After developing the Windows for Pen Computing, Microsoft extends support for the tablet that can run Windows as Microsoft's Tablet PC. According to Microsoft's definition, 2001, "Microsoft Tablet PC" is a pen-based and x86 PC that has the function of handwriting and speech recognition. Tablet PCs use the same hardware as regular laptops, but adds support for pen input. For specific support for pen input, Microsoft released Windows XP Tablet PC Edition. Currently there is no special version of Windows Tablet, but the support is built for both Home and Business versions of Windows Vista and Windows 7. Tablet running Windows to get the additional functionality using the touch screen for mouse input, handwriting recognition, and gesture support. Once the Tablet PC, UMPC Microsoft announced the initiative in 2006 to bring Windows to the tablet form factor with a smaller and centered on the touch. It was relaunched in 2010 as a Slate PC, to promote tablet running Windows 7, ahead of the launch of the Apple iPad. Slate PCs are expected to benefit from the advances of mobile devices that come from the success of netbooks. While many manufacturers are moving to the ARM architecture tablets with a lightweight operating system, Microsoft fixed in Windows. Although Microsoft has a Windows CE for ARM support he has kept the target market for smartphone industry with the new Windows Mobile and Windows based on Windows CE 6, Windows Phone 7. Some manufacturers, however, still showed a prototype of Windows CE-based tablet that runs the usual framework. With a succession of Windows Vista, Tablet PC functionality no longer requires a separate issue. Tablet PC support is built into all editions of Windows Vista with the exception of Home Basic and Starter editions. This extends the handwriting recognition, ink collection, and an additional input method for each computer that is running Vista even if the input device is an external digitizer, touch screen, or even a regular mouse. Vista also supports multi-touch and gestures (originally developed for Microsoft Surface version for Vista) and now used by the public with the release of multi-touch tablet. Windows Vista also significantly improves handwriting recognition function with the introduction of the handwriting recognition personalization tool should automatically handwriting learning tools. The functionality of tablet available in all editions except Windows 7 Starter edition. It introduces a new Math Input Panel to recognize the expression and handwritten mathematical formulas, as well as integrated with other programs. Windows 7 also significantly improves pen input and handwriting recognition with a faster, more accurate, and supports more languages, including East Asian writing systems. Personalized custom dictionaries to help with specific vocabulary (such as medical and technical terms), and predictive text input speed up the process to make the activity more quickly noted. Multi-touch technology is also available on some tablet PCs, enabling more advanced interaction using signs with the touch of your fingers like using a mouse. Problems may arise with tablet functionality of the OS. Windows 7 to have touch capabilities built with Microsoft's Surface technology. It is a touch-centric movement and UI enhancement that works with most computers touch today. Among the tablet PC was first launched in 2010 based on operating system Windows 7 is bModo12 of Galaxy.Windows bModo and Samsung has a history of tablet technology, including Windows XP Tablet PC Edition. Tablet PC Edition is a superset of Windows XP Professional, these differences tablet functionality, including alternate text input (Tablet PC Input Panel) and basic drivers for support of tablet PC specific hardware. Requirements to install Tablet PC Edition include a tablet digitizer or touchscreen device, and hardware control buttons including shortcut keys Ctrl-Alt-Delete, scroll buttons, and at least one user-configurable application button. Linux One of the early implementation of the Linux tablet was the ProGear FrontPath. ProGear using Transmeta chips and resistive digitizer. ProGear initially came with a version of Slackware Linux, but then can be bought with Windows 98. Because the goal is the computer IBM PC compatible, Windows 98 can run many different operating systems. However, these devices are no longer for sale FrontPath has ceased operations. It is important to note that the touch screen a lot of sub-notebook computer can run multiple Linux distributions with little customization. X.org now supports screen rotation and tablet input through Wacom drivers, and handwriting recognition software both from the Qt-based Qtopia and GTK +-based Internet Tablet OS provides a promising system is free and open source for future development. Open source software on Linux records include applications such as Xournal (which supports the explanation of PDF files), Gournal (Gnome-based note taking application), and Java-based Jarnal (which supports handwriting recognition as a function of default). Before the arrival of such software, many users have to rely on on-screen keyboards and alternative text input methods like Dasher. There is a handwriting recognition program that is available stand-alone, CellWriter, which requires users to write letters separately in the box. A number of projects dedicated to the Linux OS-based tablet PC. Since all of this is open source, they are freely available and can be run or ported to the device in accordance with the design of the tablet PC. Maemo (turns into MeeGo in the year 2010), a Debian Linux graphical user environment, developed for the Nokia Internet Tablet (770, N800, N810 & N900). This is the fifth generation (5G), and has a broad array of applications available in both official repositories and supported users. Ubuntu Netbook Remix edition, as well as Intel-sponsored Moblin project, both have support for touch screen user interface integrated into them. Canonical has hinted tablet support better integrated with the UI for Ubuntu 10.10. TabletKiosk currently offers a hybrid digitizer / touch device running openSUSE Linux. This is the first device with this feature to support Linux. Screen size trends Like other portable computers, a larger size brings usability becomes easier but the portability of the lower and higher power requirements. For the current tablet computer, (not a tablet PC) common size is 10 "(used by the iPad) or 7" (used by many Android tablet). Many tablet PC makers have standardized on a wide screen format 12 ", with a resolution of 1280 × 800 pixels. Fujitsu T5010 has a larger display, 13.3 ", but still running at 1280 × 800 pixels. History of tablet PCs The following list are some important basic history of tablet PCs: 1888: U.S. Patent granted to Elisha Gray on electrical stylus device for capturing handwriting. 1915: U.S. Patent on handwriting recognition user interface with a stylus. 1942: U.S. Patent on the touch screen for handwriting input. 1945: Vannevar Bush proposes Memek, data archiving device including handwriting input, in an essay As We May Think 1950: Tom Dimond show Styalator electronic tablet with pen for computer input and software for handwriting recognition in real-time text. 1966: In the science fiction television series Star Trek, the crew of the ship carrying, a large electronic clipboard wedge-shaped, operated through the use of a stylus. 1982: Pencept of Waltham, Massachusetts market a computer terminal for general purpose (general-purpose) using a tablet and handwriting recognition instead of keyboard and mouse. Cadre System markets the terminal point-of-sale Inforite that uses handwriting recognition and a small electronic tablet and pen. 1985: CIC Pencept and both offer PC computers for the consumer market using the tablet and handwriting recognition instead of keyboard and mouse. The operating system was MS-DOS. 1989: first portable computers commercially available in this type of tablet is GRiDPad from GRiD Systems released in September. The GridPad manufactured by Samsung, Samsung PenMaster modified from that never made it to commercial distribution. Operating system based on MS-DOS. Wang Laboratories introduces the Freestyle. Freestyle is an application that will do a screen capture of the MS-DOS applications, and let users add annotations voice and handwriting. Freestyle is a sophisticated precursor which is then recorded as an application for systems such as Tablet PCs. The operating system was MS-DOS In partnership with Fujitsu, Poqet Computer Corporation announced the arrival of the PC Poqet. 1991: Pentop momentum was released. GO Corporation announced a special operating system, called PenPoint OS, showing the control of the desktop operating system via handwritten gesture shapes. NCR released model 3125 pen computer running MS-DOS, OS or Windows Penpoint Pen. Apple Newton entered development, although ultimately became a PDA, like the original concept of hardware from a Tablet PC. 1992: GO Corporation sends OS PenPoint for general availability and IBM announced IBM 2125 pen computer (the first IBM model named "ThinkPad") in April. Microsoft released Windows for Pen Computing in response to OS PenPoint by GO Corporation. 1993: Poqet Fujitsu pen tablet PCs released first to use the integrated wireless LAN. Apple Computer announced the Newton PDA, also known as the Apple MessagePad, which includes handwriting recognition with a stylus. IBM releases the ThinkPad, portable tablet computers from IBM's first commercially available for the consumer market. AT & T introduced the EO Personal Communicator combining PenPoint with wireless communications. BellSouth released the IBM Simon Personal Communicator, an analog phone using the display and touch screen. This phone does not support handwriting recognition feature, but users can write a message and send it as a fax on the network analog phones, including PDAs and Email features. 1999: "QBE" pen computer created by Aqcess Technologies wins Best Show COMDEX. 2000: PaceBlade developed the first device that meets the standards of Microsoft's Tablet PC and receive the award in the best hardware VAR Vision 2000. Pen computers "QBE Vivo" created by Aqcess Technology get COMDEX Best of Show. 2001: Bill Gates of Microsoft showed the first public prototype of a Tablet PC (defined by Microsoft as a pen-computer allows hardware in accordance with the specifications made by Microsoft and running a licensed copy of the operating system "Windows XP Tablet PC Edition") at COMDEX. 2003: PaceBlade received the "Innovation des Jahres 2002/2003" for Tablet PCs from PC Magazine PaceBook Professionell at Cebit FingerWorks developing technology touch touch and movement which is then used in the Apple iPhone. 2006: Samsung introduced the Samsung Q1 UMPC. Windows Vista was released for general availability. Vista Tablet PC functionality including a special edition of Windows XP. On the Disney Channel Original Movie, Read It and Weep, she uses a Tablet PC for the journal. 2007: Axiotron Modbook introduced, the computer (and only) the first tablet based Mac hardware and Mac OS X at Macworld. 2008: In April 2008, as part of a federal court case of the larger, feature gestures and hardware operating systems Windows / Tablet PC found violating the patent by GO Corp. concerning user interfaces for pen computer operating system. Microsoft's acquisition of technology is the subject of a separate lawsuit. HP released the second Multi-Touch tablet: HP TouchSmart tx2 series. 2009: Asus announce a tablet netbook, the EEE PC T91 and T91MT, the latter of which is equipped with multi-touch screen. Always Innovating announces new tablet netbook with ARM CPU. Motion Computing J3400 launches. 2010: launch MobileDemand xTablet T7000 Rugged Tablet PCs running the Windows OS and full features include an integrated numeric keyboard, barcode scanner, credit card reader, etc. Apple introduced the iPad, running Apple's IOS. Quaduro system introduces 10 "QuadPad 3G Plus, 900 gram 3G Microsoft Windows-based tablet PC with 8 hours of battery life. Samsung introduced the Galaxy Tab, running Google Android. bModo launched bModo12 running Windows 7 OS and features including a TFT-LCD 11.6 ", 3G, Wi-Fi, GPS, Bluetooth ® 2.1, USB 2.0, SDHC slot, SIM card slot that is not locked, connectors MiniHDMI, OMTP Jack, webcam, mic, etc. Neofonie WeTab release, tablet PC to write MeeGo-based, multi-touch display screen 11.6 inches at a resolution of 1366 × 768 pixels. Dixons Retail plc introduced the Advent Vega, tablet PCs 10 "running Android 2.2, NVIDIA Tegra chipset has a 1 GHz, 512 Mb RAM and ROM, 1.3 MP camera, WiFi connectivity b / g, Bluetooth 2.1, micro SD card slot, USB port and a battery life of up to 16 hours for audio playback and 6.5 hours for video 1080p. Dell announced the Inspiron Netbook Screen Duo flip and Tablet PC HP released the Slate 500 hybrids, which run the full version of Windows 7 2011: Motorola announces Xoom Tablets, 10-inch tablet which is supported by the version of the upcoming Android 3.0, which is Honeycomb Asus EEE announced memo pad (tablet 7 inches), EEE Slate EP121 (tablet Windows 7), EEE Pad Transformer (10 inch tablet with Android) and EEE Pad Slider (10 inch tablet with sliding screen top, QWERTY keyboard) [all tablets using IPS display] showing a tablet Dell Streak 7 and says it works on 10-inch Streak 10 Apple announced two iPad
MORE

Thursday, October 13, 2011

anti-theft software

In addition to anti-theft software hp. Adeona is a software program to track the location of a stolen laptop thief, this software can also be used to detect the location of the pickpocket hp by thieves. Once the application is installed on the computer / hp then it will be run automatically when the laptop is run by thieves. If the notebook is only used in private homes are not connected to the network lan / wifi / internet then the computer will not be detected. but if the thief was someone who likes to access the internet then the internet connection while doing anti-theft software will send data to the server IP Adeona, which helps determine the location of the thief was. In addition the software also has a feature to take photos, so if the laptop has been integrated with the camera (usually in the top of the computer screen) then the perpetrators of theft can be recorded image. If you find that thieves maniac internet then using face detection software can track name, facebook or any account with pictures. Thus easily know the faces, names, addresses and other personal data without the need to report to the shaman or the police. Adeona software can be used free of charge and is open source. So create a happy person who tinkers program can learn the program code, may someday be able to develop a more complex burglar software features. Software to track the location of the laptop and phone can be used when connected to the internet, simply reinstall the software on another computer (full instructions can be found at the website Adeona). Once installed Adeona programs shortcut will appear in the Programs menu. which can be used to access the internet via the Control Panel Adeona. This software can run on linux operating system, Mac OX and Windows, as a background service software, which runs automatically when membuaka windows (other OS), and will record the IP laptops periodically, then report to the server adiona
http://adeona.cs.washington.edu/index.html
MORE

Wednesday, October 12, 2011

software honesty

Lie detector software This is a fun software which knows when you tell lies try it and u will see!! Some explanation on how it operates Truster is a fully computerized voice stress analyzer that allows you to detect the truth instantly. Based on an ingenious new algorithm to detect vocal stress, Truster is a simple yet powerful software tool for identifying a deception on the phone or in person. What Is The Need? Ever since people acquired the capability of speech, lying and deception have been inescapable facts of everyday life. Conventional lie detector results are not admissible in court because people can physically alter their behavior to appear to be telling the truth. The human voice on the other hand, cannot be manipulated. It is a complex instrument for expressing a full range of emotional and cognitive states of mind, that even the best voice training in the world cannot overcome. Better yet, vocal segments can be gathered and analyzed over the phone, taken from TV or radio shows, or even in a face to face conversation, without the subject being aware What Is IT Based On? Did you know that the human voice consists of six global levels? 1. The textual level - the words we speak. 2. The identifying level - unique elements in every individual's voice. 3. The intonation level - the way we express ourselves. 4. The emotional level - an uncontrolled element of the voice that indicates the level of excitement and the emotions they attach to what they are saying. 5. The cognitive level - an uncontrolled element of the voice that indicates the amount of conflict or agreement with the spoken sentence. 6. The physiological element - indicates the stress, physiological alertness and general physiological condition. Truster examines the emotional, cognitive and physiological patterns in our voice to deliver accurate messages regarding vocal segments of a conversation or broadcast. How Does It Work? Truster produces a computerized analysis of the speech flow to distinguish between nonverbal emotional, cognitive and stressful elements within the human voice. When all is said and done, a lie is a deviation from how one would answer an obvious question such as, What is your name? A subject may answer the exact same question differently in different situations. For example, the reaction to asking a subject how much money they made in a certain period will vary depending on whether it is during a free conversation, job interview, or legal proceeding. Lying or attempting to be faithful to the truth requires much more exertion than answering an obvious question, but it also depends on the circumstances. What Do The Results Mean? The proper interpretation of the results is crucial to the process. There are three main indications that a person is lying. When a person is stressed, confused and excited all at the same time, chances are that they are lying. However, very few people (1%) lie very convincingly without any of the above symptoms because they do not feel that there is anything wrong with lying, and/or they might not feel a need to be faithful to the truth. The system will not detect a lie if a dishonest person claims something happened and genuinely believes it to be true. That is precisely why we recommend using your common sense in analyzing Truster results. Try to focus on finding deviations in the results. For example, an honest person may get stressed, confused and excited while trying to stick to facts exactly as they remembered them. An honest person may feel that they are speaking the truth but actually be lying to themselves. A person may state that they are going to overcome certain obstacles, but may not truly believe in their capability to do so. Truster will pick that up as a deviation, but it certainly does not mean that the subject is dishonest. They may merely be inaccurate, or unsure of their words, as Truster will display throughout the conversation. Therefore, we recommend using your common sense to evaluate the results, by considering the specific context of the conversation. Truster is recognized as the most accurate tool for detecting emotions in the human voice, and it is best utilized as a decision support tool.

http://www.ziddu.com/download/4472911/truster_lie_detector_DW.rar.html
MORE

Saturday, October 8, 2011

There are many home security systems that can be applied to the dwelling. Because, as technology advances, the home also began to receive its own share of attention in terms of security systems. Some security systems can be applied in the shelter also started to vary. If it had not a few people who prefer to install locks or bars to deter thieves broke into the house, now a safety device has begun to shift with the tools of high-tech. Call it the camera or commonly called CCTV monitors and alarms home with a good range of motion sensors, vibration, smoke or fire. From the model was already more diverse and more stylis. It was certainly very related to the desires of the dwelling to the presence of a safety system that does not ruin the beauty estetikan occupancy.In fact, the trellis that initially only standard shaped like bars or square, later also began to be combined with a fine variety as a sweetener. Carving too can be tailored to the residential concept in question. Be it traditional, classical, europe, modern, minimalist, and so on. Although trellis design is growing, it still can not also satisfy the aesthetic beauty admirers occupancy. For, not a few who argue, would damage the beauty trellis presence residential interior or even the facade of the house. Thus, the presence of window film that had a strong grip when the glass finally broke new prima donna. That is reasonable because the presence of window film can provide the necessary security but still bring the beauty in a dwelling
MORE

Friday, October 7, 2011

POWERFUL LAPTOP shock, WATER RESISTANT, AND FUEL RESISTANT

POWERFUL LAPTOP shock, WATER RESISTANT, AND FUEL RESISTANT
Is Pasquale Scaturro, geophysicist, who led the expedition to explore and travel to distant places on earth with the ThinkPad laptop. "For more than 180 days a year, I could find was walking with a ThinkPad laptop in the middle of the forest area of ​​the heat and survive in the frozen north pole and in the midst of a volcanic eruption. From insects and moisture, from sand and dust, heat and cold, my ThinkPad laptop have felt it all, said Pasquale Scaturro (Exploration Specialists, Inc..). According to Lenovo, the laptop has been optimized for outdoor use. One of the proof, the police institution Conover Police Department in North Carolina use to convert their patrol cars into mobile offices. Officers used the ThinkPad T series to write and print reports of accidents, speeding tickets and criminal background checks from their cars. Lenovo laptops mentioned features the following hardiness: - Active Protection System - temporarily park the hard drive when the laptop detects the movement of a fall or sudden movement by the air bag system that resembles - Roll Cage - Serves as a protective frame around the internal components where data is stored and processing occurs, with an additional roll cage on the cover of the ThinkPad X301 - Had Shock Mounted Drive - Provides extra protection around the hard drive to protect data - Spill Resistant Keyboard - Holds up to two ounces of liquid that spilled on certain laptops with liquid memgalirkan way down the laptop To help customers protect their PC investment, Lenovo also offers Warranty and Accident Protection plans. In addition there is ThinkPlus Priority Support to provide technical support via phone anytime, call priority and improvements in place quickly. For an even faster response, available ThinkPlus Priority 4 Support for the improvements in place within four hours after the problem emerged, as well as Online Data Backup Service.
MORE

Thursday, October 6, 2011

Migration: Multiboot Windows XP and GNU / Linux

Let us understand it 10 steps to eliminate suffering subtle you learn linux. Hopefully Linux Study Guide, 10 easy and smooth move to Linux can help you .. 
1. Use Linux-like Windows default view. If regular use of windows with all the ease and flavor you familiar with how it looks, would be very difficult to move to another viewing area and foreign. Therefore, a lot of options that Linux has an interface or a view similar to Windows XP. If you are really user set in Windows, use Linux with KDE or Xfce display settings. 
2. Software2 Familiarlah with Linux on Windows before you actually switch to Linux. Get used to using Firefox when playing internet, use Open Office for your office applications other than MS. Office, or replace your Outlook with Evolution. 
3. Select the appropriate Linux distro. Beginners do not choose Slackware Linux. Can-can you commit suicide, Select Ubuntu, PCLinuxOS, Mepis, Linux Mint or Mandriva. 
4. Oprek obrak apart and Linux. Do a trial and error, try and try, satisfy curiosity and your curiosity, do not be afraid berekspreimenlah with linuk. To be able to experiment freely without fear of risk, if your CPU is idle, certainly not a problem, but if not there is idle CPU, you can install Virtual Machine, a kind of software that allows you to have a virtual CPU in your Windows system, then in vistual machine, you can install dozens of other systems including Windows XP, without fear of your Windows system error. 
5. Eliminate Administrativ menu. Ask the IT support / Linux penginstall you to eliminate the Administrative menu. Administrative menu like Samba, Network, SELinux, user administration, and so will membingunkan novice users. If you terbiada using the control panel in Windows, then the pains you can use Gnome Control Panel that has the look not much different from the Control Panel wondows version. 
6. Adopt a Adept, install, installing, loading and install software / program is unusual for you, it's known now, almost all the tasks and entertainment needs of a variety of tools available to diisntall, of a time you Bosa, you will ga ti with the others, Updates and so on. In Linux it is actually more fun, so do not think is difficult to do the unloading install software in Linux. Adept has a user-friendly interface, especially on Linux Ubuntu, install it so easy. 
7. Print guide Linux. Read the guide written on paper more easily when learning the computer, rather than relying on the help file, of any kind. Having a linux book also helps. If you are proficient Classic, Linux print file guides are available, one day if you're relaxed without the monitor screen in front of your eyes, you can read-read print out of it, itung-itung review study. 
8. Video Tutorial Linux. Learning with the help of video tutorials are very helpful. If possible, ask your IT Support video capture make a kind of specific measures such as mouse over the directory of our document files. If you are a otodidakers, look for the videos tutorials Linux virtual universe bertebarandi Internet. If you are an IT Support Linux Systems, a new user of Linux that will open a document file, they would navigate to your Home directory, then directing them to open: / home / USERNAME / Documents will confuse them, if the steps that will your first show you capture the video mode, future new users that confusion would not commute longer bother you. 
9. Forums and Mailing List Linux. If you are a Linux expert and require prospective users of the system you get the convenience, the Linux forums, mailing lists and manage your linux you must develop and encourage new users of Linux that you join. For those of you new linux users, forums and mailing lists are the best place for you to ask questions, discuss and exchange experiences. For example, these links would be beneficial: 1. KDE 2. Gnome 
10. Let Desperate Install Linux. After learning the Linux operating system is safe, reliable and affordable, what are you waiting? Let's begin to install, at least attempt to install themselves in your home. Installing your own Linux distro of your choice with all its uniqueness alone will make you more familiar with the work environment, the terms and sensation.
MORE

Wednesday, October 5, 2011

What is GPS and How It Works

TLT-1C GPS Tracking GSM / GPRS Vehicle Locator is a remote location tracking device (hereinafter referred to as TLT-1C), based on GPS technology and GSM / GPRS tekinologi mapping locations with access to users via SMS send the location latitude longitude a place, and then tracked through Google Maps or other mapping software to find lokasipelacakan device; or position tracking device uploads data via GPRS to a server, so it can be viewed by the user via the Internet, in real-time, GPS Tracking TLT 1C is required and useful for tracking vehicles, especially for vehicle logistics, companies, institutions and law enforcement duty service vehicles, bus scheduling and management of logistics or transportation. GPS Tracking TLT 1 C and its superiority 1. Support GSM900/1800MHz. . Very good to know the position of the vehicle in a weak signal status. 2. High sensitivity, low power consumption. 3. Having Fitue ntuk SOS button sends the exact location for immediate rescue / action. 4.Support check the location and real-time and historical trajectory via SMS or the Internet. Support alarm, store No. 3 Tel. 5. Support single location and continuous tracking 6. Support the cut-off electricity and oil function and recovery command 7. High reliability circuit design, in line with the automotive electronics industry standards 8. Facilities for Hearing the Voice of the Cab driver GPS Tracking 1C TLT and its main features Real-time SMS query coordinates Using the code sent to the GPS Tracking TLT 1C you will receive information about vehicle position, velocity, and time and your IMEI SIM CARD Remote monitoring capabilities TLT 1C GPS Tracking Can be tracked using a web tracker that has been provided so you can see the position of any car in real time on the website wherever you are speed alarm function TLT 1C GPS tracker can be used to provide sms alarm if you set your vehicle's speed at a certain rate, so it's over the limit GPS tracker will give you an sms to the owner historical data uploading Need history data? often we need if any - time we need a previous vehicle position data, eg when the GPS Tracking die so that the final position can be known, or proof of such driver insisted that he was in position B yesterday, when GPS tracking data shows that he is in position A Low power reminder With this feature TLT 1C gps tracking can inform you if baterynya already depleted, so we know that the battery may be revoked or the other so that we can anticipate How GPS Tracking Works
GPS tracker or GPS tracking will store all data about speed, vehicle position, flame machine, etc. in accordance with the features found in gps tracker via GSM and GPS module can send data requested by the owner such as vehicle speed, vehicle position coordinates are usually in the form which then can we confirm via google earth for the full position by using a software interface that is good then we can look at all the positions we have pasangi vehicle gps tracking with all the information we want begin to speed, the position of the vehicle, engine conditions of life or death, whether the door is open or not etc.
MORE

Tuesday, October 4, 2011

Timeline on how to enable Facebook profile FB

Info Technology has informed yesterday to the presence Facebook Timeline (view new Facebook profile page) which tells the life of a person (at least online), and will be released a few weeks ahead. The author has been able to transform profilenya into the new profile look for from the beginning has been selected as a beta tester (never make applications on FB). And fortunately for the readers of Info Technology can also directly activate the feature without waiting for Facebook Timeline publicly released. Facebook Facebook Timeline is the latest innovation announced this month at the F8 developer conference, in San Francisco. With the timeline view our Facebook profiles will be much different, more personal because this medium to introduce to the world who we are and it seems no longer need to juggle or experience hack Facebook profile. Most of the writers on these sites are generally technology has changed the look of their profile to the timeline, Log into Facebook, then go into https://developers.facebook.com/apps, when first-time entry and have never made ​​your application will be presented the screen requests for application access permissions. Create a new application by clicking Create New App, for the application name and anything else you can fill it arbitrarily. Then click Open Graph menu on the left (Fig. a), and create actions that will be performed by the application (Figure b). For example drawn filled columns one read - two columns filled article and then click Get started / Start. (When an error occurs, ignore it) Then click the menu next to Open Graph kirilalu for action to be performed by the application (. For example drawn filled columns one read - two columns filled article and then click Get started / Start. (When an error occurs, ignore it) Open the main page of Facebook, it will display an invitation to become a beta tester "Facebook Timeline" (B. Indonesia: Introducing Chronology - Profile of New Type). Select Use Now or Get It Now to start using Facebook Timeline. When all the steps above work you do, then you will see a new profile, after which you have to do is change the cover profile, making it a regular, or up to you. (Thanks to TechCrunch) - Note: Click on the image to see original size image
MORE

Sunday, October 2, 2011

Router functions

The router serves as the primary liaison between two or more networks to carry data from one network to another. The difference with the switch is a switch that is connecting several devices to form a Local Area Network (LAN). Routers use a lot in technology-based network protocol TCP / IP, and the router type is referred to as an IP Router. In addition to the IP router, there is another AppleTalk router, and still there are several other types of routers. The Internet is a prime example of a network that has a lot of IP routers. The router can also be used to connect many small networks into a larger network, called the internetwork, or to divide a large network into several subnetworks to improve performance and simplify management. Routers are sometimes also used to mengoneksikan two networks that use different media (such as wireless routers in general than he can connect a computer with a radio, it also supports connecting computers with UTP cable), or different network architectures, such as from Ethernet to Token Ring. router types In general, a router is divided into two types, namely: • static router (router static): is a router that has a static routing table in the settings manually by network administrators. • dynamic router (router dynamically): is a router that has a routing table and create a dynamic, by listening to network traffic and also to interact with other routers. Bridge versus Router How it works similar to a bridged network routers, ie, they can forward the data packet network and can also divide the network into multiple segments or network segments together. However, the router runs in the third layer of the OSI model (network layer), and use the addressing scheme used on that layer, like IP addresses. Meanwhile, the bridge network is running in the second layer of the OSI model (data link layer), and use the addressing scheme used on that layer, the MAC address. Then, when the use of a network bridge done and when the use of a router do? Bridge, should be used to connect network segments that run the same network protocol (for example: IP-based network segment with other segments of the IP network). In addition, the bridge can also be used when inside there network protocols that you can not do routing, such as NetBEUI. Meanwhile, the router should be used to connect network segments that run berebeda network protocol (as well as to connect the IP network segments with IPX network segment.) Generally, the router is more intelligent than the bridged network and can increase network bandwidth, since the router do not forward broadcasts to targeted tissues. And, the use of routers is most often done when we want to connect our network to the internet.
MORE