Tuesday, 30 October 2012

Apple smallest yet fastest: iPad Mini

A greater announcement made by Apple the lowest budget Gadget .


Here comes iPad mini Sleeker Smarter and Better.


The full experience of iPad


Enjoy the Full experience of iPad ......There is less of it,But not less too.With 10 hrs of battery backup.
That is your iPad is smaller but much bigger than any other economic tablet in its class.


Beautiful 7.9 inch display



While holding iPad in your hand feel the fluid, fast, beautiful and high responsive screen. Color are vivid and texts are sharp. A super 7.9 inches LED backlit IPS display with 1024X768 pixels of resolution.


Ultrafast Wireless


Fastest Connection.The World Over.
An advanced Wi-Fi with twice that of the previous one. This neXt generation Wi-Fi and Cellular Connection lts you Download Content, Steam Video and Browse the web at amazing Speed.

Over 275,000 apps

If it's made for iPad its made for iPad mini.
From the starting each and every application designed for iPad will work for iPad mini. They are immersive , full screen let us do any thing and every thing beyond your imagination.

Other Information

Apple come with A5 Chipset which iss already familiar  in iPad 2, with A9 ARM Cortex 1 Ghz Dual core Processor. PowerVR SGX543MP2 Graphic and 512 MB of RAM also 5MP of camera for 1080p video recording and 720p with front facing Camera on the board .
The cost of WiFi model 32 GB is 329$ and the Cellular with 459$.
 

Monday, 29 October 2012

How To Display the Full Path in the Windows Explorer Title Bar in Windows 8

Open Windows Explorer and then switch over to the View tab.


On the right-hand side click on options and then select Change folder and search options from the drop-down.
When the Folder Options dialog opens, switch over to the View options.
Here you will need to tick the Display the full path in the title bar check box.
You are done :)
Source: HowToGeek

Wednesday, 24 October 2012

MacBook with Ratina display

Apple has announced MacBook Pro 13 in with Ratina Display.

Just as the name suggests, Apple 13 inches MacBook comes with high resolution of 2560 X 1600 pixels IPS Display and 75% less reflection.
In support of Ratina Display is Integrated Intel HD 400 Graphics Bundle powered by Dual Core i5 or i7 Ivy Bridge Processor.
 

As per the Main Memory 8 GB is quiet impressive .And a huge compactable Secondary memory 768 GB SSD.With a great Connective option like USB 3.0, full HDMI port .
 

The MacBook Pro 13 inches with Ratina Display with 2.5 Ghz core i5 Processor and 8GB  RAM and 128 GB SSD will BE dilivered at the price of 1699$.

Friday, 19 October 2012

Move Out oF World oF Wire :Its time to be wireless every where

No more cables


Now you can boost your Nokia Lumia’s battery without plugging it in. Nokia Lumia 920 has wireless charging built-in. And you can charge Nokia Lumia 820 wirelessly by adding on a wireless charging shell.
Our energy-efficient wireless chargers come in all shapes, sizes and colours, so you can pick one to match your phone.
Best of all, they’re all Qi-compatible, which means you can use any wireless charger you like. And your friends can share yours too.


Nokia Wireless Charging Plate.
Phone down, power up

Place your phone on a charging plate and watch its battery go up. There’s no need to align it carefully – the charger will work as soon as it senses your Lumia on top.




Nokia Wireless Flat Pillow By Fatboy.
Put your Phone to bed.


When you go to bed, your phone can too. Just rest it on its pillow to start charging. They even come in bright colours to match your Lumia.


Nokia Wireless Charging Stand.
Charging for multi-taskers. 



Want to keep using Nokia Lumia while it Charge? Place it on our wireless charging stand so the screen's easy to see. You can even pre-set the stand to open on your phone -like an alarm or SkyDrive




JBL PowerUp Wireless Charging Speaker.
Charge while you listen.



Listen to the tunes you love with high-quality sound. And charge your Nokia Lumia wirelessly at the same time. The JBL PowerUp Wireless Charging Speaker has NFC built-in, so one tap is all it takes to connect your phone. Then while you enjoy the music, just rest your phone on top of the speaker to charge its battery. 



5 Hidden dangers of Facebook

           5 Hidden dangers of Facebook

Over the last few years, Facebook's growth has been phenomenal. The world's no. 1 social networking site also sometime back beat Google to become the most visited Web site in the US for an entire week at a stretch. However, the site has also lately being receiving lot of flak for its privacy policies.
An expert in online privacy drew attention to the five dangers of sharing information on social networking site Facebook.

Risk 1: Your information is being shared with third parties

According to Facebook policy last updated on April 2012, "When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends' names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. ... The default privacy setting for certain types of information you post on Facebook is set to "everyone." ... Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection." 

Risk 2: Privacy settings revert to a less safe default mode after each redesign

In March, private e-mail according to a Gawker report, private email addresses that many Facebook users wanted to keep hidden were revealed publicly on a multitude of Facebook profiles.

Risk 3: Facebook ads may contain malware

Recently, a Facebook event invitation was reportedly sent to some over 2,300 friends of Jim Breyer, Accel Partners venture capitalist who sits on Facebook's board of directors, asking "Would you like a Facebook phone number?" However, the message was actually a scam and the users who entered their passwords in response to the message in turn sent the whole thing to their friends lists too.

"This was a phishing scam and Jim's account appears to have been compromised," read a statement from Facebook as provided to venture industry news site PEHub. 

Risk 4: Your friends unknowingly make you vulnerable 

On May 6th, the popular social network patched a major security bug that allowed users to snoop on their friends' private chats, and view their pending friend requests. The exploit forced Facebook to temporarily disable chat.

Risk 5: Scammers are create fake profiles 

Earlier this week, 15 privacy and consumer protection organizations filed a complaint with the Federal Trade Commission, alleging that the site manipulates privacy settings to make users' personal information available for commercial use.


India is world leader in spam output

      India is world leader in spam output

A new report shows that computers based in India now send out more spam than ever before, with some having "been turned into spam-spitting zombies in botnets."

India has surpassed the U.S. and taken the lead as the greatest spam-sending country in the world. One out of every six junk messages that litter users' e-mail inboxes are coming from India, according to a new report from Sophos lab
The security vendor's third-quarter "Dirty Dozen" report of spam-relaying countries found that India upped its percentage of global spam for the third quarter in a row and now accounts for more than 16 percent of all junk e-mails.
What is important to note, however, is that this spam doesn't necessarily come directly from India's computers -- but rather from the country's "ill-protected machines" that "have been turned into spam-spitting zombies in botnets." So those people who are creating the spam could be originating from anywhere. 


 According to Sophos, 5.3 percent of the world's Internet users are from India -- ranking it as the third most connected country after China and the U.S. -- but only 10.2 percent of the population has Internet accessibility. Sophos notes that this may be one of the reasons why there is a lack of security measures for the country's computers.
The U.S.had been the number 1pamming country for years, but was bumped by India in April. However, India has long maintained a top three spot. Other countries known for being top spam-senders are Italy, Saudi Arabia, and Brazil.
Security reports over the last year have shown that malware is on the rise. According to a report by McAfee last month,malware is multiplying at faster pace now than any other time in the last four years. Worms, viruses, botnets, Trojans, and spam are increasingly attacking computers, laptops, and mobile devices.

Tuesday, 16 October 2012

store 10 terabits on a fingernail-sized device


Soon, store 10 terabits on a fingernail-sized device


A new discovery may open the way for the development of next generationdata storage devices with capacities of up to 10terabits (10 trillion bits) per square inch - vastly enhancing storage on much smaller data devices. 

Imagine storing thousands of songs and high-resolution images on data devices no bigger than a fingernail. 

An ultra-smooth surface may be the answer, according to a discovery by the researchers from Agency for Science, Technology and Research's (ASTAR) Institute of Materials Research and Engineering (IMRE) and the National University of Singapore (NUS), reports the journal Nature reports. 

The self-assembly technique is one of the simplest and cheapest high-volume methods for creating uniform, densely-packed nanostructures that could potentially help store data, according to an ASTAR statement. 

However, attempts to employ self-assembly on different surface types, such as magnetic media used for data storage, have shown varying and erratic results to date. This phenomenon has continued to puzzle industry researchers and scientists globally. 

Researchers from ASTAR have now solved this mystery and identified that the smoother the surface, the more efficient the self-assembly of nanostructures will be. 

This breakthrough allows the method to be used on more surfaces and reduces the number of defects in an industrial setting. The more densely packed the structures are in a given area, the higher the amount of data that can be stored. 

"A height close to 10 atoms, or 10 angstroms in technical terms, is all it takes to make or break self-assembly," said MSM Saifullah, one of the key researchers from ASTAR's IMRE who made the discovery. This is based on a root mean squared surface roughness of five angstrom.

Monday, 15 October 2012

Biomatrix password



Soon, eye movements can be your new password

 
Taking cue from iris scans used in UID in India, researchers are developing a new biometric system that can identify people by the way they flicker their eyes while looking at a computer screen. 

Oleg Komogortsev, a computer scientist at Texas State University-San Marco, is making use of the fact that no two people look at the world in the same way . 

When looking at a picture, different people will move their eyes among points of interest in different sequences, researchers observed. 

Even if two people trace the same paths, the exact way they move their eyes differs, the 'LiveScience' reported. 

"We are seeing there are enough differences so we can talk about this as a biometric," Komogortsev told TechNewsDaily. 

A biometric is a measurement of something on the body - fingerprints, for instance - used to identify people. 

Computer scientists all over the world are studying biometrics for crime solving, for border security, and just as a high-tech way to sign into smartphones, tablets and other devices. 

Komogortsev's research is in its earliest stages and needs years of work before it might show up at airports, high-security workplaces or even home computers. 

However, he thinks eye movements could be part of the next generation of a more established biometric iris scans, which are already used in some airports and private companies, and in a countrywide ID effort in India. 

Previously, researchers showed that crooks could fool an iris scanner with printed contacts, or by holding up a high-quality printout of the correct person's eye in front of the scanner. 

Komogortsev hopes adding an eye-movement sensor could prevent this type of counterfeiting. 

"The strength of our method is it can work together with iris [scanning]," he said. 

Komogortsev's system records eye movements and analyzes two features. In one, the system measures "fixations", the times when people linger their gaze over a point on screen. 

In another, it measures "saccades", the swift movements the eye makes when it flies between points. 

His system considers both the exact path that people's gazes take and the fixations and saccades they make along the way. 

From those movements, the system calculates unique properties about people's eyes, including the force their eye muscles use and other properties about the fat and flesh around the eye and the eyeball itself, Komogortsev said. 

UID is an initiative of Unique Identification Authority of India of the Indian government to create a unique ID for every Indian resident
.

Thursday, 11 October 2012

Validating Email Addresses in PHP 

A very quick snippet today because I've told two people to use this approach in the last few days and both of them told me they didn't know about it. How to check if an email address is valid in PHP: use one of the Filtter Function, like this:
  
 $email1 = "nonsense.something@dottiness"; // not a valid email
 $email2 = "dotty@something.whatever"; // valid email
 
 $clean_email1 = filter_var($email1, FILTER_VALIDATE_EMAIL); // $clean_email1 = false
 $clean_email2 = filter_var($email2, FILTER_VALIDATE_EMAIL); // $clean_email2 = dotty@something.whatever


The Filter extension was new in PHP 5.2, but is one of the unsung heroes of the language. It's rare for me to ever describe one approach as the "right" way to do something - but for validating data, Filter really is excellent, offering both validating and sanitising filters and generally making it super-easy to clean up incoming variables. Many of the frameworks offer equivalents, and I'm sure many of those are wrapping this too.


Source- INTERNET


Barcode turns 60!


Barcode, distinctive black-and-white stripes that provide details relating to an object you purchase, has turned 60. 

There are more than five million individual barcodes in use around the world, according to regulator GS1 UK. 

Although barcodes were filed in the US on October 7, 1952, they did not make their first appearance in a US shop until 1974 - because the laser technology used to read them did not exist, the 'BBC News' reported. 

Barcode is an optical machine-readable representation of data relating to the object to which it is attached. 

The first item to be scanned by a barcode was a packet of chewing gum in an Ohio supermarket in 1974, the report said. 

However, the black-and-white stripes did not get a universal welcome, with some wine manufacturers refusing to incorporate barcodes onto their labels for aesthetic reasons. 

Now it occasionally doubles as body art, with US singer Pink among those who sport a barcode tattoo. 

"Barcodes are an icon and rightly so - we're quite pleased about it," said Gary Lynch, chief executive of GS1 UK.

Wednesday, 10 October 2012

How To See Hidden file Using Dos .



To see the Hidden file in system, you can use dos command.
Start->Run->cmd
Write the drive name in which you want to see the hidden file .
For example if you want to see hidden file in D drive then you have just type following command:-
>D: (Press enter)
D:\> dir /ah
If the list is too long u can use
D:\> dir /ah/p/w

App helps tell your colourful pills apart.

 EVER wondered if you've popped the right pill? Now there's an app to help. There are thousands of prescription pills but few colours and shapes to choose from, which can lead to dangerous mix-ups, especially in hospitals.To help prevent such errors, Jesus Caban at the US National Institutes of Health and colleagues have developed software that can identify a pill from a phone camera image. 

Websites such as Drugs.com and Webmd have tools to help distinguish between pills but you have to type in a description, making these services too time-consuming to use in a clinical setting.Caban's software extracts the shape, colour and imprint of a pill from its image and identifies the drug with 91 per cent accuracy in less than a second. 

Future accuracy will be improved when the system learns to recognise a pill from a wider range of angles. The technique is also simple enough to work as a smartphone app so could be used at home.The team tested the system on images of 568 of the most prescribed pills, taken from different angles and in a range of lighting conditions. They present the work at the International conference on image processing in Orlando, Florida, this month.

5 Features that makes HTML5 on the Top


1. Offline storage: 

HTML5 brings a host of desktop like power to web applications, and one of the features that media organisations such as the Financial Times are already using is HTML5’s offline storage capabilities. That means that you can cache content or use a web app to use when you’re not connected to the Internet. An e-commerce HTML5 application could allow people to add items to buy later and then finish the purchase when they are back online.

2. Location: 

This isn’t part of HTML5, but geolocation is one of the features being brought to the next generation Web. If you use Safari, Chrome of Firefox 4 and newer, then you might have already seen a pop-up asking if you want to allow a website to access your location. That means, it’s not just your mobile phone that knows where it’s at anymore. Modern Web browsers can also access location on desktop computers or other non-mobile devices based on location information connected to WiFi hotspots. Businesses could deliver deals to you based on your location. You could get weather and traffic information based on where you are at without having to enter your location. Privacy-sensitive features are also being built into the specification to help keep your information and you safe.

3. Advanced graphics: 
Canvas is a new Javascript graphics library that brings a lot a host of animation effects that previously were only available via Adobe’s Flash. If you’d like to get a sense of the power of these applications, you can already play simple games all based in the browser. If you want to see the power of these graphics elements and other features of HTML5, check out this presentation all created using the new mark-up language. It’s like PowerPoint with nothing more than a web browser.
4. Multimedia: 
Good bye plug-ins. We all remember the bad old days when to play audio or video on the web, you often ran into a message saying that you needed this plug-in or that plug-in. It got better when Adobe’s Flash became the dominant way to play multimedia on the web, but now, HTML5 can easily allow audio and video playback without any plug-ins at all.
5. WORA – Write once. Run anywhere: 
The first generation of the Web was strictly about desktop computers, and the mobile web was a horrible experience. Until smartphones raised the bar for the mobile Web, there were literally hundreds of different mobile browsers. It made it extremely difficult to develop sites for mobile. With the rise of tablets and smart TVs, the Web is ready to conquer new devices. In the past, new devices meant new browsers, which meant a real headache for developers. With HTML5, browsers are much more standardised from the mobile Safari browser in the iPhone to the browser in Android handsets. Hitachi, Samsung and LG all use HTML5 browsers based on the Webkit technology that is the basis of Apple’s Safari and Google’s Chrome.
There were only 109m devices in 2010 that were HTML5 capable, but that is expected to jump to 2.1bn mobile devices by 2016, according to research by ABI Research. This is a huge opportunity, and while HTML5 won’t be finalised until 2014, that’s not stopping forward-looking companies
Source : Firstpost

Monday, 8 October 2012

STEVE JOBS


Take a look at some of the pictures of Steve Jobs in the late 60's or early 70's; the first impression one would have of him, would be of a man on a mission.
Tell all!


While there are some flower child attributes too, on the whole it seems as if he had already laid down the path of creative computing in his mind.

More than anecdotes, everyone wants infused with the usual tidbits, a rich narrative that unravels the human being behind all the accolades and media inflicted imagery. How can one get to experience, along with Jobs, the birth of a world changing idea? We already have a biographical attempt by Walter Isaacson but that did not enamour the critics. However, there is another one on its way that may just be worth your while.

Chaisann Brennan, Steve’s girlfriend from the early days, feels the need to re-introduce to us all the personality that took the world by surprise and has still left it in amazement. The St. Martin’s Press, part of Macmillan, has been outspoken about their dealings with Brennan and have confirmed that there is a book on its way.

Be rest assured, that this biography is more than just forced expressions; besides, Brennan is no stray character in the life of Jobs, who has suddenly come to the forefront to make a name for herself after his death. Instead, the two were in a serious relationship and had a baby girl together; she lived with Jobs for awhile and was a witness to the ideas that were slowly materializing. Today, Brennan resides in the San Francisco Bay Area and works as a painter.

Usually, a relatives’ or a close associate’s account of a personality’s life has been dismissed as being skewed or one-sided, but that shouldn’t be the case with Brennan. Nevertheless, if you are still apprehensive, as a warm up to the real thing, you can get hold of an article she wrote about Jobs on an earlier occasion for the Rolling Stone Magazine; trust us, it’s happening.

POSTED BY:  PuNeEt KuMaR

Handle Your Any Type Of Major Or Minor Problem Im your Pc Or Laptop:


Here is somthing intresting for you, the smart way to handle your computer and laptop ,major or minor problem in just simple way:
If any time these given problem in your computer , how to handle?

  • Any software not working
  • Speed slow
  • Games not working properly
  • do not install any software
  • slow starting of your computer
  • and many more problems
Don’t vry i will tell you the simple and easy solutionfor this type of problems.
Follow These Simple Steps for window 7,window xp
  • Open Start pannel
  • Goto all programs
  • Then goto accessories
  • Then goto SYSTEM RESTORE
After clicking system restore point a restore window will be open, click next to continue.
then a will show some important updates date of your computer,then click the first update your computer in given list .
click next to continue. after 1 or 2 minuter your computer will be restart and restoring you data will be start.
this process take 10 to 15 minuter and your computer will be start again and then your can check your problem will be definatly solved.

How to access the files when Windows is damage

  You Need An optical drive (CD,DVD or Blu-Ray) drive on the computer you wish to repair. An  burning capable  optical drive on your working...