Which is Convient Dail-up or Broadband Connections


As the 3G and 4G was emerged all telecommunication services made cheaper to use internet connections.People who want more speed for browsing and downloading may choose Broadband Connections but users who uses internet just to check their Email, Facebook,Orkut may prefered for low cost GPRS packs available.



Most users choose Broadband Connections why?
*Users they don't want to waste their time in browsing or downloading beacuse of slow connections these users like Business men, for industrial usage, and also in institute they use these type of connections.

*But people may want to use internet conncetions for general purposes like checking Email, Facebook go for dial-up connections.
since, it is low cost,preferable speed as the 3G and 4G emerged in almost countries, most of the users uses Dial-up connections.

 

The Cyborg helpful or harmful for Human kind?


Before talking about cyborg  helpful or not first we have to know about something about it.
DEFINITION:
The cyborg is defined as "a person whose physical tolerances or capabilities are extended beyond normal human limitations by a machine or other external agency that modifies the body's functions; an integrated man-machine system."

Why invented this?
Humans have limited capabilities. Humans sense the world in a restricted way, vision being the best of the senses. Humans understand the world in only 3 dimensions and communicate in a very slow, serial fashion called speech. But can this be improved.The possibility exists to enhance human capabilities. 
To harness the ever increasing abilities of machine intelligence, to enable extra sensory input and to communicate in a much richer way, using thought alone. Kevin Warwick has taken the first steps on this path, by being the world’s first CYBORG

Cyborg may have many advantages like,

Saves life’s by implantations. E.g. Heart’s pacemaker.
Metabolic control and enhanced sensory perception.
Improved reflexes and muscle capacity.
Vastly increased data processing speed and capacity.
The ability to learn new job skills and information in the time it takes to download the new information onto your computer and familiarize yourself with the information.
The ability to speak and understand any language known by the computer to which you are linked. 



But whatever may be Cyborg have its demerits like when cyborg used in a destructive way can become monsters due to the enhanced capacity to do things than a normal human.
It destroys ecological balance and against to nature.

Kevin Warwick
Its true that it might be used for future wars beyond human worriers.This cyborg is well shown in many films like Terminator salvation and many more. 

But we the normal people just we can talk about it can't we resist to develop it anyhow it should be think before ant act.


Please provide a feedback for this article.







 

Ø  


Run Java Applications or Games on Android Phone Using JBed 1.20 Java Emulator


android-java-runAll Android user who migrated from old Java or even Symbian phones are very missing their favorites Java or J2ME applications in new Android phones. But here a possibility to run your Java Applications or Games (.jar and .jad) on Android smartphone having any Android OS from 1.5 to 2.2 using JBed 1.20 Java Emulator tool for Android.

JBed 1.20 Java Emulator is an Android .apk application which makes it possible to run jar games and applications on your Android smartphone. JBed 1.20 Java Emulator tool for Android is an application which you can install your Android device and than using it you can run any Java applications.
Now you never need to forget your love for your Java applications which you using from a long time before.



How to Install JBed 1.20 Java Emulator Tool for Android:
~Download the right JBed 1.20 version from below links.
~Install JBed 1.20 in your Android phone.
~Click “SD card” on menu (or Send .jar file using file manager to JBed).
~Choose .jar file wants to run.
~Installation will begin.
~Click on your installed java application to run it.

If you see only some lines or faded screen while installing .jar file, means you device not fully supported it. Try after restarting your phone and if problem still there, simply uninstall JBed.

Download Free Jbed 1.20 Java Emulator Tool for Android:
Jbed 1.2 For Android 1.5.apk (2.9 MB)
Jbed 1.2 For Android 1.6.apk (1.95 MB)
Jbed 1.2 For Android 2.1.apk (1.95 MB)
Jbed 1.2 For Android 2.2.apk (2.0 MB)

Resources: http://www.thetechentity.com/

First Virtual Credit Card Launched by Airtel



Bharti Airtel today launched the World’s first Virtual Card. This Virtual Card launched by Airtel Africa in association with Standard Chartered Bank and MasterCard. This will operates off a wallet residing on a mobile phone. This new innovative payment method is called as Airtel 1time Shopping card. You can think about this as a Virtual credit card of OTP system that you have seen with online banking.

In this Virtual credit card system, you can generate a single use credit card with specified amount of money and which is valid only for 2-3 days. After that, the card expires. Every time an airtel customer will shop online, need to request on-the-fly a virtual shopping card. Then Airtel will generate a special 16 digit number that enables the completion of transaction. customer will get an confirmation SMS on his mobile when complete the transaction. The regulatory framework provided by Standard Chartered Bank and the global acceptance of MasterCard will ensure a reliable, convenient and secure environment.
 
Mr. Manoj Kohli, airtel CEO (International) and Joint Managing Director, said “Today’s launch of the world’s first virtual number on a mobile card marks a big milestone in mobile commerce. The airtel 1time Shopping Card is proof that airtel will deliver innovative and relevant mobilesolutions that will help consumers overcome the daily challenges in their lives. The solution will offer consumers a robust e-commerce solution that delivers security, accessibility, acceptance, ability and a global reach. Subsequent phases of the program will allow airtel subscribers to make payment across the MasterCard network.”
Bharti Airtel is one of leading global telecommunications company and has operations in 19 countries across Asia and Africa.
Sources: thetechentity

How To Prevent Mobile phishing From F-Secure Mobile Security




As the mobile internet market and smartphones are booming in industry, the chances for mobile phishing also rising day by day. Now you not safe online while on PC or your mobile. The hackers has an eye on you every-time you made a mistake. If you’re aware that online criminals are always trying to get you to give away your passwords, security data and credit card numbers, you’re probably already careful about where you enter your private information on the Internet.

Here I’m sharing 5 useful tips originally by F-Secure Mobile Security team to find out if criminals have any new tricks up their sleeves. And do online criminals have new tricks up their sleeves? The answer to that question, unfortunately, is almost always yes. There’s always a new way to scam you out of your data. Most importantly, you need to realize phishing scams are no longer restricted to your PC. In our mobile, connected world, you need to check twice or thrice when you enter your private information—whether you are on your PC, an ATM or your phone.

F-Secure Labs reports that users are increasingly likely to be phished using methods that involve their phones. The odd rendering of mobile web pages and the use of SMS to send one-time passwords are powerful new lures for the phishers of the world. So even if you are savvy enough to avoid phishing attacks on your PC, you need to be as aware when you are on your phone.

Here’s what you need to know to keep your data to yourself.

1. Always check the URL of the site you are on before you click submit
You should always check the URL of any web page you are on whether you are browsing on your phone or your PC. It’s easy to replicate the look of a site. Copying the site’s URL is more complicated. You’re looking for two things in the URL. First of all, are you really on the site you intend to be on? Forget all the stuff that comes after “.com”, you’re just making sure that you are really on Facebook.com or Amazon.com. Second, you want to make sure you see the “s” in “https”. This is especially important when you are using your phone (or PC) on an unsecured wireless network.

2. If you ever think, “Why are they asking for that?” close your browser.
F-Secure Labs recently analyzed an man-in-the-mobile (mitmo) trojan attack that created a fake bank login page. The page asked for the customer’s mobile number so that one-time passwords could be sent through SMS as a security precaution. The page also asked for the phone’s international mobile equipment identity (IMEI), which was then used by the trojan to forge a security certificate and infect your phone. The user gave the criminals critical information and made life easier for the scammers. Anytime you’re filling out a form and wonder, “Why do they need that?” stop the transaction and contact the institution directly.

3. Use only one credit card for all of your online purchases.
In some countries, using a credit card limits your fraud liability, making credit cards a safer choice than ATM cards. Regardless if this is true for you, a smart strategy is to use the same credit card for all your online purchases and check that account weekly. The sooner you spot a fraud, the less damage you are likely to incur.

4. If you’re going to make transactions on your phone, make sure it’s protected.
Our handheld mobile devices are as powerful as PCs, and they need to be protected like PCs. That means you need to keep your system and applications updated. F-Secure Mobile Security‘s Browsing Protection protects users against phishing scam. Your phone has access to your email and other crucial accounts, so it’s smart to secure it the way you secure your PC.

5. When in doubt, go in the bank.
The clock is always ticking. You’re late; you want to save some time. That’s when your mobile phone makes life easier. However, for your most crucial interactions, such as large transfers, you best choice is to go into the branch itself. That way you don’t have to worry about phishing or mobile trojans. You may have to wait in line, but a little wait in line is nothing compared to being phished.

Android 2.3.4 for Nexus S 2.3.4 for Nexus S brings video and voice chat to Gtalk

android 2.3.4Android 2.3.4 heading to Nexus S over the air, bringing video and voice chat to Gtalk.

Google's about to start delivering Android 2.3.4 to Nexus S devices out in the wild, and in among all the bug fixes and optimizations, users will find the addition of video and voice chat to Google Talk.
 You'll be able to do it anywhere you can get a web connection going, whether by virtue of WiFi, 3G, 4G, or the force, and other Gingerbread handsets are expected to get the same improvements in time. For now, however, Google's own-branded device is the only one enjoying the very freshest Gingerbread around.

Source: Google Mobile Blog

Check out the Video.


Android 2.3.4 for Nexus S

Android 2.3.4 Nexus S

Which OS is Ideal for You? Windows 7, Vista or XP?


windowsThe answer depends on more than you might think. Just because Windows Vista is the newest full version available doesn’t automatically make it the perfect fit. Similarly, Windows 7 is the most flexible Microsoft OS (operating system) to date,
but some users will have ample reason to stick with Vista or Windows XP until Windows 7 is on store shelves. A lot depends on what you are using your computer for and on which type of computer you’re using. Gamers, media authors, travel-inclined business people and casual web surfers all have different priorities and will want to choose OSs accordingly.

We’ve provided a brief outline of the basic features and key uses of Windows 7, Vista and Windows XP to give you an idea of which OS is right for you. More detailed information about each of the Windows versions can be found in our hands on reviews above.

Microsoft Windows 7

Windows 7 has hit the computer world with a bang and is turning heads around the world. From the time Windows 7 was in its beta form, until its release in October, Microsoft has made sure that this operating system was up to par. One thing that
stands out about Windows 7 is the ability to personalize and make it your own, alongside this comes new and advanced features such as Snap, Shake, Pin, Windows Search and much more. We are in a new age so a new fresh interface and look of
Windows 7 are welcome changes, especially compared to the more resource-hungry and less innovative operation of Vista.

Key features include:

* Plug and play capability with hardware and peripheral devices
* Completely customizable task bar
* Jump lists
* Homegroup networking
* Low memory footprint

Vista

Microsoft will never fully own up to just how bumpy Vista’s release was. The young debutante Vista was demanding, awkward and aggravating. But just because Vista was a failure at release doesn’t mean it was a bad operating system. With Microsoft’s continued patching and the release of the Vista Service Pack 1, the OS matured into a highly functional, if resource-hungry, interface ideal for most users. Many users will be comfortable using Vista well after Windows 7 is available.

Key features include:

* Windows Media Center
* Advanced protection from malware
* Parental control options
* Windows sidebar
* Real time searches

Windows XP

Despite the fact that XP has been around for years, it is relatively forgiving on older machines and netbooks. XP continues to have a great reputation amongst gamers due to its low impact idling and compatibility with both old and new programs.
Users with specific multimedia demands that don’t want to upgrade their hardware will find XP an appealing alternative to the more demanding Vista. While XP will no longer be sold after the release of Windows 7, Microsoft has committed to providing support for the OS until 2014.

Key features include:

* Fast boot up time
* Driver rollback
* Low system requirements
* Low memory footprint

What to Look for in a Windows Operating System ?

When considering a new Windows operating system it is most important to think about how you intend to use the computer.

After deciding your computer's primary function, you will need to decide what kind of networking and administrations tools you need and the level of security you desire .Below are the criteria TopTenREVIEWS used to evaluate Windows Operating Systems:

Home and Office Use
We assessed the operating system in terms of how well it supports general home use; for example, it should have basic Internet security and be easy to use. OSs for office or business use need sophisticated Internet security, the capacity to network and ought to include administration tools.

Multimedia Use
Some OSs are designed to entertain, these can play/record television, burn DVDs and can support HD video and music without supplementary software.

Security
All OSs should provide frequently updated security features such as firewalls, pop-up blockers, antivirus and antispyware software and more. OSs for business or network use require additional security and administrator tools.

Networking
Business and home OSs can be used in a network. These systems should offer administration tools and security.

Ease of Use
All OSs should be straightforward; we looked at its search functions and more to rate the ease of use.

Technical Help/Support
Since OSs perform numerous functions, above average support is needed. Generally, Microsoft offers more support choices to its business customers and mostly self-guided support for individuals.

Resources: http://windows-operating-system-reviews.toptenreviews.com/

Many Organizations have problems with Password resets

Almost of organizations have problems with password resets.
With increasing numbers of remote and mobile workers, and more and more complex passwords to remember to log onto corporate networks, employees often need to contact IT support helpdesks to reset their forgotten passwords.
HTK has surveyed IT first, second and third line support managers and team leaders from a range of sectors, and found that 90% of organizations are faced with problems when it comes to password reset issues; with 5% claiming that it placed a huge drain on resources.

“Based on our previous discussions with CIOs - who typically didn’t perceive password resets as a problem - we decided to survey those in IT support who are dealing with password resets on a daily basis,” said Marlon Bowser, CEO of HTK. “The results throw up an interesting disparity in perceptions between a company’s CIO and IT support staff, with those working on the ground reporting that password-related activity takes up valuable time and resources.”
The results - from sectors including high-tech, manufacturing banking, media and marketing - also show that 82% of organizations require their users to change their passwords quarterly or more frequently.

Despite this and various analyst reports that put the average cost to the help desk per manual password reset at anything between £30 and £50, the survey also found that 79.5% of companies still do not have an automated password reset service,
such as online or IVR. And in today’s increasingly flexible workplace, it is surprising that 60% don’t offer any out-of-hours support in the case of forgotten passwords.

There are web-based options for password resets, but 67.5% had reservations about these solutions because they were either not secure enough, too complicated or because users would need web access (and a forgotten system password often means no
access to the web.) However, 65% said that, if reliably deployed, biometrics or voice print technology would probably or definitely play an increasing role in IT security.

Resources: http://www.net-security.org/

Why We Always Choose Android?

why android
WHY ANDROID?
People who are willing to purchase a new mobile phones, in almost all of them are going to choose or opt for Google's Android phones(Actually Android is a Mobile OS).
You may get question that why always people opt for Android Mobile phone.

The mobile phone with Android OS gives a many special and unique feature that's why people go for it.






Here i am going give the main reason why people opt for Android Phones(3.0).


*Better graphics
The power of the GeForce graphics accelerators found in the new hardware, providing a more PC-like experience than any phone is currently capable of.

*Updated apps
The camera and Gallery have been modified for big screens and Contacts and Email have a new, dualpane UI. Books looks better than iBooks and YouTube’s new 3D video wall is just stunning.

*Good Web browser
Based on Google’s superb Chrome, the new browser uses the same approach to tabs. Users can choose to automatically sign in to Google sites and sync bookmarks with their desktop Chrome account.

*Control or customize main screen
New widgets allow screens to display 3D-flippable grids and lists, and the interface has been redesigned from the ground up to support new gestural control.

*Multi-tasking
The system bar has a list of recent apps to make toggling programs a cinch, and uses visual cues to display a snapshot status of each app. This makes them identifiable as they run in the background.







List of Computer Viruses from 2000 Onward

In the 21st century the number of computer viruses considerably increased. To be able to tackle these viruses you need to install an effective anti-virus software like the Antivirus and Security All-in-One-Suite, which, besides checking for any computer viruses, will be able to block pop-ups, spam and even stop hacker attacks on your computer.
Our computer virus list features descriptions of a large number of dangerous computer viruses, worms and Trojans that appeared starting with 2000 and till this day.





Inta - 2000

This computer virus was released by the members of an underground group called 29 A. As soon as the virus was released, it attacked Windows 2000 files even before the software giant, Microsoft, managed to announce the commercial version of its OS. Inta was the first computer virus to infect Windows 2000.


LoveLetter - 2000

This script virus caused a real pandemic on May 5, 2000. Most users were unaware of the fact that VBS and TXT files could cause harm, but they did, being infected with this dangerous virus. As soon as the virus is uploaded, it destroys numerous files and then sends itself to everyone in the MS Outlook contact list.


Timofonica - first cellular virus - 2000

For the first time the Timofonica virus was spotted on June 6, 2000. It was the first mobile phone virus. Besides being able to spread through email, the virus also sent messages to different mobile phones that were in the MoviStar cellular network, owned by Telefonica, global telecommunications giant.

Liberty virus - 2000

This computer virus was identified in August. It is considered to be the first Trojan to be able to affect PalmOS of Palm Pilot, which is why it was included in our computer virus list. When the virus was installed on the machine, it deleted files. However, the good news is that the virus could not replicate itself.


Mandragore - 2001

The year 2001 was the one in which instant messaging services registered a significant increase in popularity. Some of them were ICQ and MS Instant Messenger, thus they served as guinea pigs for spreading malicious code. The Internet worm Mandragore used these services to install into the system and copy itself to Windows CurrentUser startup directory as "Gspot.exe" file. Because it was placed in the Startup folder, the worm was automatically run by the operating system on the next Windows startup. Then it ran two background processes, while remaining in Windows memory. The threads displayed two messages:

"I'm Gnutella node, and here is file you are looking for." and "the filename you are looking for" with ".exe" extension, and with worm code in it."


Ramen - 2001

This computer virus managed to affect numerous corporate networks in just a few days. It penetrated NASA, A&M University as well as the Taiwanese hardware vendor Supermicro. Shortly after the launch of the virus, a lot of clones appeared along with a large number of new Linux worms. Ramen was a 300K multi-component worm that included 26 files and is the first known computer virus to infect RedHat Linux systems. You can find more information about



Klez - 2002

The Klez worm-virus managed to cause serious trouble in 2002. Initially detected on October 26 it continued to be considered one the most dangerous malware for the next two years. By the end of 2002, about 60 percent of all infections were the result of the Klez virus. Written in Microsoft Visual C++, it spread through the Internet, being attached to emails.

Slapper – 2002

This Internet worm was able to infect computers that run on Linux. The virus' source was about 68.4KB in size. Not only did it infect computer, it also managed to spread further, being able to act as a backdoor on the infected machine. Thus it made possible for the attacker to run different commands and start Denial-of-Service attacks by taking advantage of a distributed network maintained between the infected computers.

Lentin (aka Yaha) - 2002

Just like Klez this computer virus spread over the Internet being attacked to infected emails. It represents a mass-mailing worm that initially looks for emails in Windows Address Book, MSN, .NET messenger cache folders as well as HTM(L) files. It was able to spread with the help of a 'VALENTIN.SCR' file attached to a message that read:

* Subject 1:
* Melt the Heart of your Valentine with this beautiful Screen saver
* Body 1:
* This e-mail is never sent unsolicited. If you need to unsubscribe, follow the instructions at the bottom of the message.


Slammer - 2003

This Internet worm features in our computer virus list because it is the first fileless worm. Slammer was able to spread by taking advantage of the vulnerability found in the SQL Server. It fully showed the abilities of a flash-worm. The worm caused a denial of service on several Internet hosts and considerably slowed down the overall Internet traffic. The computer virus managed to infect about 75,000 computers in just 10 minutes.

Lovesan – 2003

This computer worm for the first time appeared in August 2003, showing the vulnerability of Windows. Lovesan took advantage of the vulnerability of the operating system in order to replicate itself - a technique similar that used by the Slammer. The virus downloads and the tries to run a file called msblast.exe. In addition, the user receives the following message:

* "I just want to say LOVE YOU SAN!!
* billy gates why do you make this possible? Stop making money and fix your software!!"

Mimail - 2003

This computer worm used the newest vulnerability in Internet Explorer in order to activate itself. It is worth mentioning that the vulnerability made it possible for the worm to extract the binary code from HTML files and the execute it. For the first time Minmail was used in Russia.

Zotob - 2005

This computer virus was launched on August 14, 2005. It used the Plug and Play (PnP) vulnerabilities, thus making big problems on the system. When Zotob infects a machine, it slows it down, causing the computer to repeatedly crash and reboot. Infected computers running Windows 2000 were left exposed to additional attacks, while those that run Windows XP only spread the worms.


Strorm - 2007

This computer virus holds a special place in our computer virus list. For the first time Storm was spotted at the beginning of 2007. It hid in email attachments that had the following title line: "230 dead as storm batters Europe." Users that opened the attachment let the virus in and their machines joined an ever-growing botnet. Security experts spread in opinions regarding the number of computers that were infected with this computer virus: some say that the number reached 10 million, while others claim that between a few thousand and about 1 million computers were infected. Computers infected with Storm virus could be used to launch millions of spam emails that would advertise Web links, and if someone clicked those links, they would download the computer virus on their machine. The Storm botnet was able to attack the online operations carried out by security vendors and analysts who tried to investigate the computer virus. The United States Federal Bureau of Investigation believes that Storm represents a major treat to increased bank fraud, identity theft, and a number of other cybercrimes.


The Conficker - 2008

This is a computer worm that for the first time was spotted in November 2008. Besides infecting the user's computer, the worm spreads to other machines throughout the network automatically. It managed to affects the computers of the French Navy, UK Ministry of Defense, Sheffield Hospital, German Bundeswehr as well as Norwegian Police. Microsoft decided to give away $250,000 for valuable information that could help capture the developer of Conficker.


W32.Dozer - 2009

Detected this year, the computer worm can load malicious files onto the infected machine. It was developed to delete information on infected computers and prevent them from being rebooted.

Other viruses that appeared during this period of time include:

2000: Dilber,CIH, SK, Bolzano, Jer, Stream, Fable, Pirus, Hybris;

2001: CodeRed, Nimda, Aliz, BadtransII, Magistr, SirCam, California.IBM, Girl Thing;

2002: LFM, Donut, Tanatos (aka Bugbear), Thus, TheSecond, Marker, Flop, Elkern, CIH, FunLove, Spaces;

2003: Ganda, Avron, Sobig, Tanatos.b, I-Worm.Swen, Backdoor.Agobot, Afcore;

2004: Witty worm, Nuclear RAT, Vundo, Bitfrost, Santy, Stratio-Zip, Netsky-D and MyDoom-O;

2005: Samy XSS, Zlob Trojan, Bandook;

2006: OSX/Leap-A, Stration (a.k.a. Warezov);

2008: MacSweeper, Sinowal (a.k.a. Mebroot), The Koobface.

Original resources: http://www.infoniac.com/

Technology that Allows Controlling a Car Using the Power of Mind


BrainDriver is the latest invention of Raul Rojas, an AI professor at the Freie Universitat Berlin. It represents a car driving system that allows the driver to control a vehicle using the power of mind.

It is worth mentioning that the technology makes use of electroencephalography, or EEG, which allows it to read the brain's neuro-signals and then convert the electric impulses into steering output.


Thus one can control the steering, brakes and more by simply using their thought. The EEG was developed by Emotiv, a firm based in San Francisco. It is worth mentioning that initially the firm developed the EEG for gaming but now it used to help read human emotions and convert them into actions in accordance with pre-programmed patterns.

So far the technology is in the trial phase. The testing of the new system took place at the Berlin Airport, reports Spectrum IEEE.

Check out the video below to see the technology in action.




ORIGINAL RESOURCES: http://www.infoniac.com/

Eye controlled Mouse System it make easie for users

eye-control-mouse



A Swedish company called Tobii recently announced the launch of its new eye-control device dubbed PCEye. The firm's invention tracks movement of a user's eyes and coverts it into mouse cursor on the screen.

According to Tobii, the device is connected through a USB. It is compatible with a large number of software. The company's main goal was to create a device that would improve the interactivity for stroke victims and other people suffering from impaired motor skills.



Tobii's representatives also mentioned that the device can work with displays that have a diagonal ranging from 15 to 20-inches. The optimal distance at which the invention can operate ranges from 19.7 – 31.5-inches (50 – 80 cm).

It is worth mentioning that in order to work properly the device should be connected to a computer that has at least a 1GHz dual-core processor.

The advanced algorithms developed by Tobii specialists, in combination with high-res cameras can track and register the eye movement of about 95 percent of people. PCEye works perfectly in different light conditions and irrespective of the user's eye color.


orignal resources: http://www.infoniac.com/hi-tech/latest-invention-pceye-eye-controlled-mouse-system-from-tobii.html

Plastic Computer Memory Device Uses Electron Spin to Read and Write Data


plastic memeory

 Researchers at Ohio State University have demonstrated the first plastic computer memory device that utilizes the spin of electrons to read and write data. An alternative to traditional microelectronics, so-called "spintronics" could store more data in less space, process data faster, and consume less power.
In the August 2010 issue of the journal Nature Materials, Arthur J. Epstein and colleagues describe how they created a prototype plastic spintronic device using techniques found in the mainstream computer industry today.


At this point, the device is little more than a thin strip of dark blue organic-based magnet layered with a metallic ferromagnet and connected to two electrical leads. (A ferromagnet is a magnet made of ferrous metal such as iron. Common household refrigerator magnets are ferromagnets.) Still, the researchers successfully recorded data on it and retrieved the data by controlling the spins of the electrons with a magnetic field.
Epstein, Distinguished University Professor of physics and chemistry and director of the Institute for Magnetic and Electronic Polymers at Ohio State, described the material as a hybrid of a semiconductor that is made from organic materials and a special magnetic polymer semiconductor. As such, it is a bridge between today's computers and the all-polymer, spintronic computers that he and his partners hope to enable in the future.

Normal electronics encode computer data based on a binary code of ones and zeros, depending on whether an electron is present in a void within the material. But researchers have long known that electrons can be polarized to orient in particular directions, like a bar magnet. They refer to this orientation as spin -- either "spin up" or "spin down" -- and have been working on a way to store data using spin. The resulting electronics, dubbed spintronics, would effectively let computers store and transfer twice as much data per electron.
But higher data density is only part of the story.
"Spintronics is often just seen as a way to get more information out of an electron, but really it's about moving to the next generation of electronics," Epstein said. "We could solve many of the problems facing computers today by using spintronics."
Typical circuit boards use a lot of energy. Moving electrons through them creates heat, and it takes a lot of energy to cool them. Chip makers are limited in how closely they can pack circuits together to avoid overheating.

Flipping the spin of an electron requires less energy, and produces hardly any heat at all, he explained. That means that spintronic devices could run on smaller batteries. If they were made out of plastic, they would also be light and flexible.
"We would love to take portable electronics to a spin platform," Epstein said. "Think about soldiers in the field who have to carry heavy battery packs, or even civilian 'road warriors' commuting to meetings. If we had a lighter weight spintronic device which operates itself at a lower energy cost, and if we could make it on a flexible polymer display, soldiers and other users could just roll it up and carry it. We see this portable technology as a powerful platform for helping people."
The magnetic polymer semiconductor in this study, vanadium tetracyanoethanide, is the first organic-based magnet that operates above room temperature. It was developed by Epstein and his long-standing collaborator Joel S. Miller of the University of Utah. Postdoctoral researcher Jung-Woo Yoo called the new material an important milestone in spintronic research.
"Our main achievement is that we applied this polymer-based magnet semiconductor as a spin polarizer -- meaning we could save data (spin up and down) on it using a tiny magnetic field -- and a spin detector -- meaning we could read the data back," he said. "Now we are closer to constructing a device from all-organic material."

In the prototype device, electrons pass into the polymer, and a magnetic field orients them as spin up or spin down. The electrons can then pass into the conventional magnetic layer, but only if the spin of electrons there are oriented in the same way. If they are not, the resistance is too high for the electrons to pass. So the researchers were able to read spin data from their device based on whether the resistance was high or low.
Collaborators at the University of Wisconsin-Madison prepared a sample of conventional magnetic film, and Yoo and his Ohio State colleagues layered it together with the organic magnet to make a working device.
As a test, the researchers exposed the material to a magnetic field that varied in strength over time. To determine whether the material recorded the magnetic pattern and functioned as a good spin injector/detector, they measured the electric current passing through the two magnetic layers. This method is similar to the way computers read and write data to a magnetic hard drive today.
The results, Yoo said, were "textbook" -- they retrieved the magnetic data in its entirety, exactly as they stored it.
The patented technology should transfer easily to industry, he added. "Any place that makes computer chips could do this. Plus, in this case, we made the device at room temperature, and the process is very eco-friendly."

Coauthors on the paper included Chia-Yi Chen and Vladimir Prigodin of Ohio State, and H.W. Jang, C.W. Bark, and Chang-Beom Eom of the University of Wisconsin-Madison.This research was funded by the Air Force Office of Scientific Research, the Department of Energy, the National Science Foundation, and the Office of Naval Research.
Original resources: http://sciencedaily.com/

Researchers Advance Toward Hybrid Spintronic Computer Chips



Researchers here have created the first electronic circuit to merge traditional inorganic semiconductors with organic "spintronics" -- devices that utilize the spin of electrons to read, write and manipulate data.
Ezekiel Johnston-Halperin, assistant professor of physics, and his team combined an inorganic semiconductor with a unique plastic material that is under development in colleague Arthur J. Epstein's lab at Ohio State University.



Last year, Epstein, Distinguished University Professor of physics and chemistry and director of the Institute for Magnetic and Electronic Polymers at Ohio State, demonstrated the first successful data storage and retrieval on a plastic spintronic device.

Now Johnston-Halperin, Epstein, and their colleagues have incorporated the plastic device into a traditional circuit based on gallium arsenide. Two of their now-former doctoral students, Lei Fang and Deniz Bozdag, had to devise a new fabrication technique to make the device.

In a paper published onlineon April 13 in the journal Physical Review Letters, they describe how they transmitted a spin-polarized electrical current from the plastic material, through the gallium arsenide, and into a light-emitting diode (LED) as proof that the organic and inorganic parts were working together.

"Hybrid structures promise functionality that no other materials, neither organic nor inorganic, can currently achieve alone," Johnston-Halperin said. "We've opened the door to linking this exciting new material to traditional electronic devices with transistor and logic functionality. In the longer term this work promises new, chemically based functionality for spintronic devices."

Normal electronics encode computer data based on a binary code of ones and zeros, depending on whether an electron is present or not within the material. But researchers have long known that electrons can be polarized to orient in particular directions, like a bar magnet. They refer to this orientation as spin -- either "spin up" or "spin down" -- and this approach, dubbed spintronics, has been applied to memory-based technologies for modern computing. For example, the terabyte drives now commercially available would not be possible without spintronic technology.

If scientists could expand spintronic technology beyond memory applications into logic and computing applications, major advances in information processing could follow, Johnston-Halperin explained. Spintronic logic would theoretically require much less power, and produce much less heat, than current electronics, while enabling computers to turn on instantly without "booting up." Hybrid and organic devices further promise computers that are lighter and more flexible, much as organic LEDs are now replacing inorganic LEDs in the production of flexible displays.

A spintronic semiconductor must be magnetic, so that the spin of electrons can be flipped for data storage and manipulation. Few typical semiconductors -- that is, inorganic semiconductors -- are magnetic. Of those that are, all require extreme cold, with operating temperatures below -150 degrees Fahrenheit or -100 degrees Celsius. That's colder than the coldest outdoor temperature ever recorded in Antarctica.

"In order to build a practical spintronic device, you need a material that is both semiconducting and magnetic at room temperature. To my knowledge, Art's organic materials are the only ones that do that," Johnston-Halperin said. The organic magnetic semiconductors were developed by Epstein and his long-standing collaborator Joel S. Miller of the University of Utah.

The biggest barrier that the researchers faced was device fabrication. Traditional inorganic devices are made at high temperatures with harsh solvents and acids that organics can't tolerate. Fang and Bozdag solved this problem by building the inorganic part in a traditional cleanroom, and then adding an organic layer in Epstein's customized organics lab -- a complex process that required a redesign of the circuitry in both parts.

"You could ask, why didn't we go with all organics, then?" Johnston-Halperin said. "Well, the reality is that industry already knows how to make devices out of inorganic materials. That expertise and equipment is already in place. If we can just get organic and inorganic materials to work together, then we can take advantage of that existing infrastructure to move spintronics forward right away."

He added that much work will need to be done before manufacturers can mass-produce hybrid spintronics. But as a demonstration of fundamental science, this first hybrid circuit lays the foundation for technologies to come.

For the demonstration, the researchers used the organic magnet, which they made from a polymer called vanadium tetracyanoethylene, to polarize the spins in an electrical current. This electrical current then passed through the gallium arsenide layer, and into an LED.

To confirm that the electrons were still polarized when they reached the LED, the researchers measured the spectrum and polarization of light shining from the LED. The light was indeed polarized, indicating the initial polarization of the incoming electrons.

The fact that they were able to measure the electrons' polarization with the LED also suggests that other researchers can use this same technique to test spin in other organic systems.

Coauthors on the paper included former doctoral student Chia-Yi Chen and former postdoctoral researcher Patrick Truitt.

This research was funded by the National Science Foundation's Materials Research Science and Engineering Centers program, Ohio State's Institute for Materials Research, and the Department of Energy.

original resources:http://sciencedaily.com/

iphone can scan your face in 3D

iphone-as-face-scannerDo you Want a 3D scanner, but it cost higher! do you thinking like that  now no  problem , a   new iPhone app turns your face or any  object into a 3D computer model that can easily be edited or even reproduced with a 3D printer.






The app, dubbed Trimensional, was created by Grant Schindler, a computer scientist at the Georgia Institute of Technology. It uses the iPhone's screen to project four different patterns of light on to the object being scanned and snaps photos with the front-mounted camera. The app then compares the lighting patterns and stitches the photos together to produce the 3D model.
Original resources:http://www.newscientist.com/

BlackBerry launches phones for CDMA users

blackberryGood news for CDMA users in India that BlackBerry launches phones for CDMA users.BlackBerry handset maker Research In Motion (RIM) announced the launch of its new dual-screen 'Style' smartphone for CDMA customers in India, to be sold in the open market.Before this BlackBerry was launched for CDMA customers were bundled with the services of Tata Teleservices and Reliance.


What's the new feature?

The new smartphone has a compact flip design with dual high-resolution displays and a QWERTY keyboard. The phone has a 2-inch  external screen for quick seeing of notifications and messages along with a 2.7-inch  internal screen.

"The CDMA segment represents a significant portion of the overall mobile subscriber base in India and we are pleased to further our commitment to Indian consumers with the introduction of this powerful and stylish BlackBerry smartphone," RIM India Managing Director Frenny Bawa said in a statement.

This also comes with  features like 5 mega pixel camera with flash. The handset will support video recording, offers built-in GPS for location-based applications and geo-tagging, Wi-Fi access and an expandable memory slot for up to 32GB of additional storage.

Addition feaures:

The BlackBerry Style smartphone will offer an optical trackpad for navigation. It will support applications like YouTube , Facebook , Twitter and more.

Availability:

The phone is now available in the market and distribution of the smartphone is being managed by Brightpoint India, RIM's national retail distribution partner for CDMA-enabled BlackBerry smartphones, the statement said.

Play game easier now by the Project NATAL of Microsoft

play gameMicrosoft’s prototype system dubbed Project Natal is giving a whole new meaning to gaming: gaming with no controller at all. Your movements and voice control the game. “Microsoft stunned the video game world with its forthcoming ‘Project Natal’ technology, full-body motion-sensitive technology that should allow gamers to do what they want without holding on to any hardware.” The hardware component of the Natal system includes a color video camera, an infrared emitter and sensor that give it depth perception, a mic that figures out where you are, and a microprocessor to crunch all that data. The software component digests data in real time from 48 points on the body, plus audio input and delivers perfectly smooth game control.


so you thinking how can we play?

For Example, think you playing any fighting game.. if you want to smash your opponent, give the motion with your hand. Another instance, If you playing football, you want to kick ball then make it with motion. Thats the thing you have to do and you really get excited while playing.

I think now you are making plan for to play it, the go. All the best.

Now you can dial phone numbers with your brain

dial with brainPeople may get tired or bored with dialing phone number.In this you also be one and including me also.This is will really irritating for sometimes when we have to call for more numbers many times.
Here is the solutions made by the researchers by new device that will dial the number for you.

This new device is a Bluetooth headband which wear on your head. It uses Electroencephalograph (EEG) to read the brain signals. It then decodes them and transmits to your phone via Bluetooth. Your phone then dials the numbers. This has been currently designed for Nokia N73 only. But if it becomes successful, it can be seen as a very common accessory with senior people, disabled people, and with people who are so busy that they cant even dial a number on their phone.

This device is now giving an accuracy of 70-85% when dialling a 10 digit number.Anyway this is not 100%accurate but scientists were making research on this to make it possible upto 100% accurate.

How To make Gmail Has to work fast


gmail boost

Gmail is one of the most widely used email service in the world. It is very popular since provides storage space, fast user interface, free sign-up etc. However, there are a lot of features that can enhance the user experience of the mail service by manifold. Most users are aware of the features that are enabled by default and use them regularly but, don't know the tricks how to boost there Gmail.

But you can fallow below steps to enhance your Gmail.


1) Don't upload, just embed
By default, Gmail gives you the option of only attaching images to an email. However, with this feature enabled you can embed images from your computer or from a website directly into the mail body. Go to Settings, click on Labs, scroll down to the feature that says "Inserting Images" and enable it. You will notice the new insert image box in your mail composer right next to the emoticon icon.

2)Control yourself
This feature is useful for people who have multiple Gmail address or who want to grant read/write permission for their account to another user. Go to Settings, click on Accounts and Import, at the bottom you will see an option that says "Grant Access to your account". Click on Add Account and enter the Gmail address of the person you want to grant access. Once the person accepts the verification mail, he/she can access your account by clicking on the next to his own mail ID on top right and selecting your mail ID.

3) Undo sended mail
If you pressed the send mail button and want to cancel it? Gmail Labs has a feature that gives you a few seconds to stop the mail from going out after you press the send button. Go to Settings, click on Labs and enable the option that says "Undo Send". Click General under Settings and here you can select the time for which the email can be stopped after it is sent. When you press the send button, you would see a yellow box saying, "Your message has been sent. Undo or View message" on top. Click on undo to cancel sending the mail.

4) Reply to all
Gmail's default reply button composes the mail to the person who has sent the mail ignoring all the people who were put in CC. If you have to do a reply all, you have to press the arrow next to the reply box and then select "reply to all". Instead, you can set the "reply to all" function as default. Go to Settings, click on Labs and enable "Default reply to all" feature. It is far simpler to just remove selective email IDs from the CC box than selecting " reply to all" from a drop down box every time.

I think you can get the ideas about how to boost gmail.If you are having any idea about this please don't hesitate to share with us.

New Next Generation Dashboard and Editor From Blogger


new dashboard

Blogger has finally launched the  next generation design interface dashboard and the new design is not only cleaner but very modern also. Now the new totally reconstructed blogger dashboard is live for blogger in draft users. Currently Blogger rolling out the new dashboard to a few people who are already using Blogger in Draft.

The new dashboard is fully redesigned. New post editor and a new content discovery feature and all uses Google Web Toolkit, delivering the latest in web technology.


According to Blogger, “As we shared before, our team has been hard at work on a brand new, next generation design for Blogger, Today, we’re thrilled to announce the public launch of our redesign! But please wait a second before you go check out your Blogger dashboard, because we’re planning a gradual rollout that will start with a limited set of users who visit our new feature testing ground, Blogger in Draft.”
Few may going to worries seeing this post they not getted this new design , but don’t worry you all get the new  dashboard very soon. There’s much more to the redesign than shiny new graphics and pages essentially rewritten the entire application from scratch, using the latest web technologies that will enable us to make future updates in more easy and flexible.

How to change the logo of web site and blogger

How to change logo or favicon image of your blogger?

The user like who is using blogger or any one new get the trouble to change logo of their website.As i am one of them since i also experienced with same problem.Now i give the solution for you.

Here you can fallow the below steps to change your logo.

step1. If you want to chnage the logo of your website or blogger, the first is that logo image should be available in your storage space.(any where on online).
For this you have to upload your logo image and it should be in ".ico" format.

step2. After uploading you can save the link where the .ico formatted logo image is available.

step3. If you are a blogger, first login and go to design section and click "edit html".
Where you can insert the fallowing code after  <head>tag and before close of </head> tag and also you should put code after  </title> tag only to view your logo.


<link href="SAVED.ico" rel="shortcut icon"></link>

The "saved.ico" is the address of logo image available.

step3.After inserting this code you have to save template.

step4.Click on view blog, your logo will be appeared on your blogger.
If you get any problem regarding this don't hesitate to contact me.
All the best

How to Create Search Engine in Blogger


New users of blogger may going to worry about how to make search engine in their blog by seeing other proffesional web sites.Here now i am going to give javascript for making search engine in your blog.

To make search engine fallow this steps:

step1: First Login to Blogger, then go to "Layout --> Page Elements". click "Add a page elements" then chose "HTML/Java Script".

step2: Put the code below into your Content Box

<form action="http://mytricksblog.blogspot.com/search" method="get">
<input class="textinput" name="q" size="30" type="text" /> <input class="buttonsubmit" name="submit" type="submit" value="search" /></form>




step3: save it and click on view blog, you get what you wanted i.e, search engine for you blog.


All the best

Invisible Computer Mouse Invented By Pranav Mistry


As we all know that there is wireless mouse and it is already available in market.But latest invisible computer mouse invented by Pranav Mistry.



Mouseless it is an invisible computer mouse that provides the similar interaction of a physical mouse without actually needing a real hardware mouse. Pranav Mistry, who earlier had made headlines for his invention Sixth Sense and received Popular Science 2009 Invention Award for it, has now invented another similar device and this time its invisible.


As the computer mouse has remained largely unchanged over the last decades, we have become increasingly proficient at operating the two-button mouse. Recently, various multitouch and gestural interaction technologies have been explored as means to implement alternative methods to interact with a computer.
Mouseless is an invisible computer mouse project done in in MIT Fluid Interfaces Group headed by Pranav Mistry, this invisible mouse provides the familiarity of interaction of a physical mouse without actually needing a real hardware mouse, hence removes the requirement of having a physical mouse altogether but still provides the intuitive interaction of a physical mouse that everyone is familiar with.
The Mouseless invention removes the requirement of having a physical mouse altogether but still provides the intuitive interaction of a physical mouse that we are familiar with. Mouseless consists of an Infrared (IR) laser beam (with line cap) and an Infrared camera. Both IR laser and IR camera are embedded in the computer. The laser beam module is modified with a line cap and placed such that it creates a plane of IR laser just above the surface the computer sits on. The user cups their hand, as if a physical mouse was present underneath, and the laser beam lights up the hand which is in contact with the surface. The IR camera detects those bright IR blobs using computer vision. The change in the position and arrangements of these blobs are interpreted as mouse cursor movement and mouse clicks. As the user moves their hand the cursor on screen moves accordingly. When the user taps their index finger, the size of the blob changes and the camera recognizes the intended mouse click.


Pranav Mistry said, "As we improve our computer vision algorithms, an extensive library of gestures could be implemented in addition to mouse movement and mouse clicks. Typical multi-touch gestures, such as zooming in and out, as well as novel gestures, such as balling one’s fist are all possible. In addition, the use of multiple laser beams would allow for recognition of a wider range of free hand motions, enabling novel gestures that the hardware mouse cannot support." This mouse costs just 20$ to build its prototype.
Here a videofor Mouseless inventionand watch it you can get the idea about it.


Receive Free Mail to SMS Alert on Mobile


You can Receive Instant Free Mail to SMS Alert on Mobile When you Got New Email.
Yes this is possible by using way2sms.com
People may worried to check mail all the time and its going to waste their time and you might can't check all the time if you dont have a internet connection.


Here is the solutions for your problem. Here a simple way to get mail alerts on mobile for your Yahoo, Gmail or any other accounts. It'll send you a SMS alert when you have a new mail in your inbox and save your valuable time for checking webmail inbox.

You can get SMS alerts on your mobile phone as and when the new Mail arrives. You'll receive alerts when you want them. You can link your existing Yahoo, Gmail and other email accounts and get instant Free SMS alerts for your Yahoo, Gmail accounts also.


The main advantage of this is you can get control over your inblox.

Receive alerts for only emails that you want and when you want them. Avoid unwanted mail alerts for Spam, Promotional email Ids. You can enter those email ids, you wish NOT TO RECEIVE alerts on your mobile. Now you can receive alerts for your Gmail account too. All you have to do is Just link your Gmail account with your Way2SMS account. Way2sms mail alerts works only for mail accounts with forwarding facility. In order to get mail alerts, you have to forward a copy of your mail to way2sms mail account. Also, Way2SMS doesn't display your forwarded mails any where on way2sms.com.

can Google have chance to Reinvent Web Video?

An ambitious attempt by Google to shift the Web over to a new, royalty-free video format has taken significant strides. New software has been released that can build the format into dedicated chips for cell phones and other gadgets, perhaps the most crucial step before it can displace the proprietary video format that currently dominates.
Google's video format is known as WebM. It was created by combining the audio format Vorbis with VP8, a video format that Google bought last year with the intention of making it free for all to use in WebM. Google wants WebM to become the default for Web video and join the wave of new, powerful, and, crucially, free-to-use Web technologies such as HTML5 that enables Web pages to act like desktop applications.
By enabling the development of equivalent chips for WebM is crucial if the rival format is to gain a foothold. Without such hardware, the work of encoding video is done by software that taxes a device's main CPU too much, draining battery life. "The new hardware encoder encodes VP8, using a tiny fraction of the electricity that a general-purpose processor/CPU would use even at HD resolution".
The Google team tested the new hardware encoder by running it on simulated chips and real ones known as FPGAs that can be reconfigured to implement different hardware designs. Interested hardware firms can apply to receive the code for the new encoder online. Kuusela wrote in a blog post that "several top-tier semiconductor partners" are already starting to build their next chips with VP8 built in, but wouldn't name specific firms. Major chipmakers, including AMD, Qualcomm, and Texas Instruments, are public supporters of the project, though, although they will likely support both VP8 and existing formats in their chips.
All the best google –WebM.