Wednesday, 16 December 2015

iClever IC-F40 In-Car Universal Wireless FM Transmitter with USB Car Charger

 Universal Wireless FM Transmitter with USB Car Charger


This car accessory works with both iPhones and Android phones. This car charger also lets you listen to music on your device. There’s a handy auto-scan function that lets you find an “empty” radio station to use very quickly. Whether you need a way to charge your device on the go, or just a way to play music on your device in an older car, this is a solid choice. Plus, with more states and cities cracking down on using cell phones while driving, this accessory gives you a way to take calls, hands-free.


INDOOR CELLUAR SIGNAL BOOSTER


INDOOR CELLUAR SIGNAL BOOSTER







Indoor celluar signal booster kit Wilson Electronics, which recently rebranded as WeBoost, specializes in gadgets that boost your cell signal. If you live or work in an area that has terrible cell coverage, this can be a great accessory to get the most out of your Android device. The Wilson Electronics Pro 70 signal booster was named
WIRELESS PRODUCT OF THE YEAR AT CES 2015, but the company has several other signal boosters that cost less. This signal booster increase both voice and 3G data signals for all major North American cell carriers.

Thursday, 10 December 2015

BOOSTING YOUR MIND BY PLAYING 3D VIDEO GAME

BOOST YOUR MING

Are you hooked to 3D video games? Well, if yes, that may not be too bad as new research reveals that playing 3D video games, besides being lots of fun, can also boost the formation of memories.
Along with adding to the trove of research that shows these games can improve eye-hand coordination and reaction time, this finding shows the potential for novel virtual approaches to helping people who lose memory as they age or suffer from dementia.
For their research, University of California-Irvine neurobiologists Craig Stark and Dane Clemenson recruited non-gamer college students to play either a video game with a passive, two-dimensional environment or one with an intricate, 3D setting for 30 minutes per day over two weeks.
Before and after the two-week period, the students took memory tests that engaged the brain's hippocampus, the region associated with complex learning and memory.
They were given a series of pictures of everyday objects to study. Then they were shown images of the same objects, new ones and others that differed slightly from the original items and asked to categorize them.
Recognition of the slightly altered images requires the hippocampus, Stark said.Students playing the video game improved their scores on the memory test, while the 2D gamers did not. Memory performance increased by 12 percent, the same amount it normally decreases between the ages of 45 and 70.
"First, the 3D games have a few things the 2D ones do not. They've got a lot more spatial information in there to explore. Second, they're much more complex, with a lot more information to learn Either way, we know this kind of learning and memory not only stimulates but requires the hippocampus," he added.
The study appeared in The Journal of Neuroscience.

Sunday, 29 November 2015

li-fi TECHNOLOGY

li-fi    TECHNOLOGY






A new method of delivering data, which uses the visible spectrum rather than radio waves, has been tested in a working office.
Li-fi can deliver internet access 100 times faster than traditional wi-fi, offering speeds of up to 1Gbps (gigabit per second).
It requires a light source, such as a standard LED bulb, an internet connection and a photo detector.
It was tested this week by Estonian start-up Velmenni, in Tallinn.
Velmenni used a li-fi-enabled light bulb to transmit data at speeds of 10Gbps. Laboratory tests have shown theoretical speeds of up to 224Gbps.
It was tested in an office, to allow workers to access the internet and in an industrial space, where it provided a smart lighting solution.
Light might be the preferred option for transmitting data over long distances via cables, but when it comes to short range wireless, radio waves rule in the form of Wi-Fi and Bluetooth. Now Mexican company Sisoft, working with researchers from the Autonomous Technological Institute of Mexico (ITAM), has developed a wireless technology that transmits data in visible light emitted from LED lamps, while lighting the room at the same time. Called Li-Fi, which is short for light fidelity, the technology is what is known as Visible Light Communication (VLC). Unlike infrared based system. VLC involves transmitting data using light visible to the human eye. In this case it is transmitted as intermittent, imperceptible flickers of light emitted by LEDs. The team started out with audio, cabling up a protoboard table to a smartphone via its 3.5 mm audio jack. The protoboard table converted the audio signal into an optical signal that is transmitted by a special emitter across the spectrum of light generated by an LED lamp. At the receiving end, a receptor located in a speaker captured the signal and converted it back into an audio signal that was played by the speaker.
For wireless internet transmission, the principle is the same but makes use of a receptor device designed to be placed above a router. The router incorporates an LED lamp to transmit data so anyone falling within the halo of light emitted by the LED will be in range. However, only those with a receptor/transmitter device will be able to send and receive the signal.
The Sisoft team says it has used the technology to transmit audio, video and internet at rates of up to 10 gigabits per second. This is an improvement over similar Li-Fi systems developed at  siemens and pennsylvania state university that achieved transfer rates of 500 Mbps and 1.6 Gbps, respectively.
In addition to its impressive transfer rate, Sisoft also highlights other benefits of the technology. Since the data is transferred via light, there is no way to hack it, making it safer, (although no mention is made of how easy it would be to take a peek at the data someone else is receiving). Additionally, it could be used in areas such as hospitals where radiation equipment can block or disrupt wireless signals. And of course, it provides illumination at the same time.
source: Sisoft de Mexico,

Sunday, 30 August 2015

CARS IN FUTURE

CARS IN FUTURE

People looking for super cars, they are called as future cars, people not interested to wait for signal long time
they are looking for super fast cars.... every one needs it for time saving..
research are going on to develop a super car, recently google is running a project about drive less car, there is no need to drive it... the computer will take care of it.... lets wait and see..... dream your super car.... make a air traffic 

Monday, 17 August 2015

MOUSE FOR GAME LOVER

MOUSE FOR GAME LOVER



are you a great  fan of the Diablo series of games?

its third installation – the much-hyped Diablo III – might have left you with a bit of a grimace: it was damn hard.

I can report to you from the front lines of playing the game that yes, it was in fact as hard as discussed, and yes, it was in fact as long as rumored. I in fact failed to complete the game, after realizing that if one more of those flying  monsters killed me I was set to punch a hole through my monitor. But I digress.

One of the reasons that Diablo III was harder than it might have -been was its inclusion of some anti-macro technology, blocking users from running short scripts to help them launch repeat actions to speed along their gameplay. That was a no in the game, leading to more button mashing and general frustration THE GILA from GX gaming  that has a- surprising claim: it has both a CPU and a block of memory on-board, allowing it the capability to to get around certain in-game restrictions on macros. This means that, in theory, you could turn the tables on Diablo III and let you combo-power your way through the game with the click of a pre-programed button. And the mouse has oodles of them, with profile switching to allow you to jump from game to game, sans the need to re-code.....

The only real downside to the Gila is that it appears to be a mouse crossed with a Transformer that recently went through a blender the hard way...

The thing will set you back about $100, but is currently out of stock on Amazon. It’s a relatively new mouse, which we first spotted last night at CES Unveiled. Hello from Las Vega..

Thursday, 23 July 2015

THE Vivo X5 "ONE THE SLIMMEST PONE" 4.75

THE Vivo X5 "ONE THE SLIMMEST PONE"  4.75




 The Chinese smartphone manufacturer Vivo announced the world’s slimmest phone X5 Max in China, on December 10th. At 4.75mm, the Vivo X5 max dethrones the recently launched Oppo R5 as the world’s slimmest phone that measures 4.85mm thick.

The Vivo X5 Max features a 5.5-inch 1080p super AMOLED display screen which is also the world’s thinnest screen with a thickness of only 1.36mm. The handset is dual SIM, with one slot for a Micro-SIM card and another one for a nano-SIM card or TF card. The super-thin smartphone is also 4G LTE-capable.

The smartphone is powered by 1.7GHz 64-bit Qualcomm Snapdragon 615 octa-core processor coupled with 2GB of RAM. There’s 16GB of internal storage which can be expanded to 128GB.The Vivo X5 Max comes with a 5mp front-facing camera and a 13mp rear-facing camera with a Sony IMX214 sensor

Monday, 20 July 2015

DIAMOND ROSE iPHONE 32GB "MOST EXPENSIVE PHONE IN THE WORLD"

The world’s most expensive iPhone

The world’s most expensive iPhone to date is the 32 GB iPhone 4 Diamond Rose by Stuart Hughes. With a price of about $8 million the phone’s bezel is made of rose and approximately 500 individual flawless diamonds that total over 100ct. The back is also rose gold and features the Apple logo all decked out with 53 additional diamonds, while the front navigation button is platinum with interchangeable single cut 7.4ct pink or rare 8ct Flawless diamonds in the center.


Luxor Las Vegas Jackpo


Luxor Las Vegas Jackpo





This phone comes from a traditional purveyor of a luxury handsets – Gresso, and is called Luxor Las Vegas Jackpot. This phone was established in Switzerland in2005. It is made of solid gold weighing 180 grams. The back panel is made up of African backwoods that is more than 200 years old. That wood is the most expensive wood in the world. Its keys are made of sapphire crystal. And it costs a cool $1 million.

MOST EXPENSIVE MOBILE FROM SONY ERICSSON

MOST EXPENSIVE MOBILE FROM SONY ERICSSON


sony Ericsson's Black Diamon. 
this phone is designed by Jaren Goh. a stylish concept for sony. It features mirror detailing, polycarbonate mirror and an organic LED technology. Of course, when it comes to Sony, nobody can challenge the screen results. It is decorated with two diamonds, one on the navigation buttons and the other in the back of the phone. The price of this phone is $300,000







iPHONE PRINCESS PLUS "EXPENSIVE mobile"


iPhone princess plus 




iPhone princess plus is designed by famous designer Austria, and Peter aloisson. expensive
 this special iPhone flavour comes with no less than 138 princess cut and 180 brilliant cut diamonds with a weight of 16.50 – 17.75. And according to Peter Aloisson, the diamonds have the best quality, so owning such a device is quite a remarkable thing.
It’s price is $ 176.400.

One may think that since it is priced at such a high rate, there would be few or perhaps no buyers for it. But surprisingly a Russian businessman had already pre-ordered it in October 2007 and the handset has been delivered to him in January 2008.
The phone features yet remain untouched and the iPhone Princess Plus stands a class apart from the rest of the iPhones and also comes with a heavy price tag.


UPCOMING I PHONE 7 PLUS "AMAZING LOADED PHONE"

iPhone 7 Plus





iPhone 7 Plus”. The leaks generated significant buzz among techies as the source is arguably the most reliable one for advanced information on Apple’s upcoming products. In January of 2011, for example, Kuo almost perfectly predicted the iPad 2’s dual-core processor, screen resolution, and camera specs. He also correctly forecast several features of the iPhone 5, the discontinuation of the 17-inch MacBook Pro, and the redesign of the iMacs. But Kuo has also had his fair share of forecasting duds, including a prediction that a cheaper iPhone would be issued in 2013. Nevertheless, when it comes to forecasts on Apple products, hardly anyone can match Kuo’s accuracy.

Here are ten of Kuo’s most exciting predictions on Apple’s rumored iPhone 6S and IPhone 6S Plus (or iPhone 7 and iPhone 7 Plus), which will supposedly begin being mass produced in mid-to-late August Force Touch, already unveiled on Apple’s new 13-inch MacBook Pro and the Apple Watch, is a haptic technology that allows for the detection of the force of a tap and correspondingly responds uniquely to the variances in the applied pressure. But what benefit does the inclusion of such technology in the new iPhones really provide for their users? It’s actually pretty exciting. Because Force sensors allow for the detection of variances in the intensity of pressure applied, a hard press could enable particular capabilities, such as displaying the definition of a word or showing the preview of a file. Increased pressure could also indicate that the user wants to increase the rate at which a movie fast forwards or an image zooms. And not only taps, but also drags can be pressure-sensitive, meaning signatures could be drawn with the precision of a fountain pen, thus raising the possibility for electronically generated signatures to be just as or even more reliably verifiable than physically written ones.

Tuesday, 14 July 2015

SAFE YOUR SMART PHONE


SAFE YOUR SMART PHONE



If you are still coping with threats to your system, then be ready to do the same with your mobile phone, especially the high-end ones that are enabled with internet. Mobile phones are now more vulnerable to virus attacks and the risk has increased manifold in the last few years. With mobile phones without IMEI number flooding in the market, this risk has increased a lot. Virus can attack files like games, software, security patches, and ad-on functionalities of your mobile. However, with the problem comes a solution as well. There are ways, which can help you protect your mobile from an attack by viruses or malware. All you need to do is to be a little vigilant.

Steps to follow

The steps you should follow to protect your mobile include:

Mobile antivirus: You can download an antivirus application directly in your smartphone
Branded mobiles: make sure that you always choose a mobile from a recognized brand, which come with IMEI number.
Scan your mobile: Once you download an antivirus application in your phone, remember to scan your mobile often to search for any virus.
Turn off Bluetooth: Bluetooth is another way through which unknown applications or virus can make way into your mobile, so when in unknown places, it is better to turn the Bluetooth function off.
The bright side for mobile users

The numbers of mobile malware and worms are constantly on the rise, as virus writers creates new ways of attacking software run by mobile phones. When on one side virus attacks on mobile is increasing at a fast pace, on the other side expanding field of mobile communications also offer opportunity of designing security in a proper manner. Other than installing mobile antivirus, you should follow some precautionary steps to make sure that your mobile stay away from virus attack. When you surf the net from your mobile, ensure that you download content from a reliable website only.

Other points to remember to protect your mobile device

Some of the other points, which you should keep in mind include:
Avoid downloading unknown software from internet
It is also recommended to maintain a backup of your contact list
When accepting content and programs like videos, mobile themes, photos, etc. verify the source, especially while downloading from the web.
If you have Bluetooth, then put it on non-discoverable mode, and never accept data, which comes from sources you do not trust.
You can also use password to protect your device, as this helps to prevent the use of data stored in your phone.
Update virus database and stay away from malicious messages

Just like your system, keep the virus database of your mobile antivirus updated all the time, so that it can protect your mobile from new viruses, which can creep into it. Even though viruses created for mobile phones are not very damaging, but the future is unpredictable, so you should be prepared for the worst attacks. Viruses can also spread through multimedia messages, so keep away from sharing such messages, as these can be malicious.

THE POLICE VIRUS


THE POLICE VIRUS


A few days ago a new Android malware showed up, Android/Koler.A. It was in the news as it was actually a Police Virus / ransomware attack, similar to the ones we have seen in Windows computers, but this time it was targeting mobile phones.

Although in this case this piece of malware cannot encrypt any of the phone data, it is nasty and it is really difficult to get rid of it (without antivirus for Android), as the warning message is always on top and the user has only a few seconds to try to uninstall it.

While we were studying it, we found a new variant exactly the same as the first one but this one was connecting to a different server, in order to download the proper warning. And this server was still up… It turns out that the cybercriminals made a small mistake configuring it and left the door half-opened  Sadly, we could not get access to all the information there (there was a mysql database with all the payments, infections, etc. that we couldn’t reach ) but still we were able to download some files from the server and take a look at how it works.

I won’t go into details about the mistake they made to leave that door half-opened, as of course we do not want to help them

Unsurprisingly, the way it works from the server side is really similar to the ones targeting Windows and that we have seen in the past: a number of scripts to geolocalize the device and show the message in the local language and with the images of local law enforcement. It saves information from all infected devices in the database and it takes the IMEI number of the mobile phone, adding the MD5 of the malware that is infecting the device. Doing this they can track the number of infections per malware variant and measure the success of their different infection campaigns.

This Trojan is targeting users from 31 different countries from all around the world; 23 of them are Europeans:
Austria, Belgium, Czech Republic, Germany, Denmark, Finland, France, Greece, Hungary, Ireland, Italy, Latvia, Netherlands, Norway, Poland, Portugal, Romania, Spain, Sweden, Switzerland, Slovenia, Slovakia and United Kingdom.

Users from these countries are also being targeted: Australia, Bolivia, Canada, Ecuador, Mexico, New Zealand, Turkey and United States of America.

Android-based smart phone users infectious Trojan virus



Android-based smart phone users against an infectious Trojan virus

Cybersecurity sleuths have alerted Android-based smart phone users against an infectious Trojan virus which steals vital information from the personal device and can even illegally send SMSes to those on the mobile contact list.

The deadly virus has been identified as 'AndroidSmssend' and it can acquire as many as four aliases to hoodwink the user and perpetrate its destructive activities on a personal Android enabled phone.

"Android/SmsSend is a premium service abuser family malware that arrives bundled with legitimate Android applications and infects Android based smartphones
"Once infected, it sends text messages (typically with a link to itself or a different threat) to a specific number, typically to numbers on the contact list and is also capable to send SMS to premium rate numbers," the Computer Emergency Response Team of India (CERT-In) said in its latest advisory to Android phone users in the country.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian internet domain.

It said that after a typical successful infection of the virus, basic information about the smart phone like IMEI number, device id, device type among others are compromised and it can even install spyware on the targeted device.

The virus is so notorious, the agency said, that it "steals contacts and pictures, tracks the location, steals passwords, illegally accesses text messages, crashes a complete system, steals personal banking information when logged in, installs other sort of spyware and disables firewall and anti-virus program to defend itself."

The CERT-In said the malware is created by modifying the legitimate application and then re-distributing via marketplace or other separate channels.

The agency has suggested some counter-measures in this regard.

"Do not download and install applications from untrusted sources, install applications downloaded from reputed application market only, run a full system scan on device with mobile security solution or mobile anti-virus solution, check for the permissions required by an application before installing, exercise caution while visiting trusted/untrusted sites for clicking links, install Android updates and patches and use device encryption or encrypting external SD card feature available with most of the android OS (operating system)," it said.

Also, avoid using unsecured, unknown Wi-Fi networks and make a practice of taking regular backup of the Android device, the advisory said.

Monday, 22 June 2015

SECURITY ATTACK ON SAMSUNG


SECURITY ATTACK ON SAMSUNG 




Chicago-based mobile-security firm NowSecure has found a flaw that could give hackers nearly complete control over Samsung's Galaxy S6, S5, S4 and S4 Mini devices, including the phones' cameras and microphones. The vulnerability, which may affect up to 600 million handsets, stems from Samsung's pre-installed version of the popular SwiftKey keyboard; Samsung does not encrypt the executable files it transmits as updates to users.

The flaw was made public only yesterday (June 16) at the Black Hat London security conference, but NowSecure says it notified Samsung in December 2014, and that the handset maker distributed a patch to cellular network operators earlier this year.

However, there appears to be no way in which an end user can confirm that his or her device has been patched by the carrier, nor any available method of user mitigation. NowSecure advises that Samsung Galaxy users should consider switching to a different brand of phone for the time being. (Samsung did not immediately respond to a request for comment from Tom's Guide.)

Malicious hackers could exploit the flaw to conduct man-in-the-middle attacks on Samsung devices operating on an unsecured Wifi network, or set up fake cellular base stations to do the same. The attacker would prompt the Samsung keyboard app to accept and install a malicious update file.

Because the keyboard app (which is separate from the stand-alone SwiftKey app available in the Google Play store) runs as a privileged user, it has much more access to the Android operating system than a regular app would, and a malicious update would turn the keyboard app into super-malware capable of almost anything. An attacker could peep through your camera, listen to your microphone (your calls, for example), access your GPS transceiver to track your location, install more malicious apps and access photos stored on your device.

Updating the stand-alone SwiftKey app is pointless, since it is separate from the built-in Samsung keyboard (which cannot be uninstalled), as is switching to another default keyboard, since the Samsung keyboard will continue to run in the background.

Since a patch does exist for this specific vulnerability, and the exploit is so far only a proof of concept, it may all seem like not much to worry about. Unfortunately, there is plenty of opportunity for copycat hacks, as NowSecure has posted the code behind its exploit. Furthermore, mobile network operators are notoriously slow at pushing out updates, and not informing end users of what's being fixed when updates are pushed out.

According to NowSecure, as of July 16, the following devices have not received that patch from their mobile network providers:

Samsung Galaxy S6 on Verizon
Samsung Galaxy S6 on Sprint
Samsung Galaxy S5 on T-Mobile
Samsung Galaxy S4 Mini on AT&T
As for an additional dozen Galaxy devices on the major carriers that may be vulnerable, the firm has yet to test them. But in its technical report, NowSecure does have some very blunt advice for all owners of Samsung Galaxy S6, S5, S4 and S4 Mini smartphones: "Avoid insecure Wi-Fi networks, use a different mobile device and contact your carrier for patch information and timing."
FOR MORE:http://www.tomsguide.com/us/samsung-galaxy-keyboard-flaw,news-21135.html

PUSHBULLET

PUSHBULLET





PUSHBULLET IS A HANDY LITTLE APPLICATION and browser extension
pushbullet allows user to easily share files, notification, links. and other material between 
your phone and your computer. pushbullet can send your phone's notification such as messages call
to your desktop,
and also you can share notes, links, lists, and files across all of your devices. pushbullet having
"channels" feature which sends notifications from a variety of sources such as online deals, 
website newsfeeds, news, and more

MOBILE SPY BASIC VERSION


MOBILE SPY BASIC VERSION





this application is different from other parent control....
the purposefully designed for parents whose teen are almost certainly spending
too much time on their smartphones...
by using "mobile spy" you find out where your kids are and have their phones most recent pictures
and texts emailed to you. and also provides an overview of location history, browsing history, messages and call logs.

Thursday, 18 June 2015

SMART WATCH

Smart watches




Hot on the heels of the Pebble and Samsung Galaxy Gear smart watches, will surely come newer and more innovative mobile-linked wristpieces.

In fact, at the 2014 Mobile World Congress expo, we're bound to see loads of the things in a concept stage.

But 2014 will be the year Apple launches one. Or maybe it won’t.

Both of which would be a big story.

The first would show the potential power of these products and the second would dismiss the idea as a fad if a company like Apple fails to take up the gauntlet.

No doubt, in time, we'll discover which one.

DIGITAL SMART WATCH

DIGITAL MOBILE WATCH



Similarly, 2016 will be the year of technology that you wear - and not just on your wrist or nose.

The whole sector looks set to increase throughout our lives on the back of the growing trend for wearable fitness devices that track exercise progress and healthy living.

Expect to see products built into clothing as well as stuff you can physically wear yourself.

CONCEPT ELECTRIC BIKE LEAOS WITH CHARGING FROM THE SUN


Concept Electric bike Leaos with charging from the sun.







Leaos little-known company is working to create the eponymous bicycle equipped with an electric motor. The main feature of this mode of transport will be the presence of integrated built-in batteries that will store electrical energy, to convert from sunlight

THE FUTURE'S SMART TABLE


Smart table based on Windows and Android.


Ideum company surprised the world in the past the curious novelties, but this time its developers decided to hit the audience on a grand scale. Device designed to cause delight and surprise,was the “smart”, neither more nor less,, a table, which get the nice name Duet.
Smart table is made literally in the form most of the coffee, or coffee table.. The table top is made in the form of a huge touch screen with support for multiple simultaneous touches, and it may be displayed the interface of one of the two installed OS. It works as touch computer system, transmits images in resolution Full HD, which, moreover, provides for the needs of the user two full OS: Android 4.4 mobile and Windows 8.

THE FUTURES SMART HOME


The smart-home

The Internet of Things (IoT) has, for some time, suggested the inter-connectivity of otherwise separate devices and ecosystems; connected devices improving the practicality of our day to day lives. 2015 will see the IoT come to a domestic setting in a big way – with connected devices pulling the idea of the smart home sharply into focus. Thanks to prospective pushes from the likes of LG and Samsung, the smart home market looks set for sudden growth. The industry drive may mean surges in home sensor and security products (accessed and controlled via a smartphone). But it will also mean more smart devices aimed at monitoring utilities and home systems, aiding productivity and delivering entertainment.

Monday, 8 June 2015

GALAXY MOBILE INTO GAMING CONSOLE


GALAXY MOBILE INTO GAMING CONSOLE

GALAXY MOBILE INTO GAMING CONSOLE



The new Samsung Smartphone GamePad enhances your gaming experience on your Samsung smartphone . It sports gaming console like control keys and Bluetooth/NFC connectivity support . It is so portable and convenient that you can play your favorite game anytime and anywhere, it instantly transform your Samsung smartphone or tablet into a portable gaming console. It comes with rechargeable battery which you can charge by the connecting its microUSB port cable .

Samsung Smartphone GamePad key features :

Compatible with Samsung Android devices
Bluetooth, NFC wireless connectivity
Easy to carry
Durable and Compact
Support a variety of games
Support devices with 4-inches to 6.3-inches display

Specifications of Samsung Smartphone GamePad :

Compatibility
Android OS 4.1 more (Optimized for Samsung devices with Android 4.3 more)
Connectivity
Bluetooth v3.0, NFC(Samsung devices with Android 4.3 more)
3.0 class 2, HID
Control Keys
– D-Pad (8 way)
– 2 Analog Sticks
– 4 Action buttons and 2 Trigger buttons
– Select button and Start button
– PLAY button (Samsung devices with Android 4.3 more)
Dimension
137.78 x 86.47 x 31.80 mm
Weight
195g
Battery
Rechargeable : 160mA
Color : Black

DRIVERLESS CARS FROM GOOGLE


DRIVERLESS CARS FROM GOOGLE



Google on Friday announced it will begin testing prototypes of its fully autonomous self-driving cars on public roads. The vehicles won't roam too far from their Mountain View, California, home -- but this latest phase of testing could be critical both for cultivating positive consumer perceptions, and influencing future legislation affecting the nascent sector.Google has "a few" driverless car prototypes that will be testing this summer, said Chris Urmson, director of the Google Self-Driving Car Project. The prototypes are based on the familiar Smart Fortwo-like bubble designs that have become almost synonymous with self-driving cars.

Google previously had leaned heavily on modified Lexus RX450h SUVs to conduct its research into autonomous vehicle technologies. The SUVs have logged a close to a million miles of autonomous driving on test tracks and public roads since the start of the project, and they have been traveling roughly 10,000 miles each week, Urmson said.

Mountain View residents needn't worry about driverless cars flying around their neighborhoods at high speeds. The Google cars will operate at a "neighborhood-friendly" top speed of 25mph, and they'll have driver on board -- as well as a removable steering wheel, accelerator pedal, and brake pedal -- should manual operation be warranted, the company said.

In the coming years, Google wants to launch pilot programs so that it can learn more about how people would use driverless cars. For now, though, the company wants to gauge public perception of the vehicles and discover challenges unique to driverless cars.

NASA'S $2.25M CHALLANGE


NASA'S $2.25M CHALLANGE



NASA and America Makes have challenged innovators in the additive construction market to design a habitat for deep space exploration for the first stage of the competition and to fabricate such facilities in the second phase.

The organizations will award a $50,000 prize and a pair of US$1.1 million purses for the winners of the multistage challenge. Registration opened for phase one on Saturday, and the second stage will launch on September 27.

Entrants have been challenged to design a 3D-printable habitat for the first phase of the competition, and the team that wins that level will be awarded $50,000.

The second stage of the contest challenges teams to a) develop fabrication technologies; and b) build a 3D-printed habitat, using "indigenous" material with or without recycled materials. The winners of the two levels each will be awarded $1.1 million.

NASA has encouraged entrants to "think outside the box," so the organization expects the teams to get creative in approaches and to leverage advanced technologies to realize their designs, emphasized Janet L. Anderson, a spokesperson for NASA's Marshall Space Flight Center. Teams can compete in any level and won't be negatively impacted for focusing on one.

"Teams may perhaps develop a way to use heat to fuse materials, or use a chemical reaction to solidify a slurry material," Anderson told TechNewsWorld. "Any of these groundbreaking technologies could win the 3D-Printed Habitat Challenge, and go on to be a game changer for future NASA missions or commercial ventures."

Sunday, 7 June 2015

NOKIA viNe service a real time GPS BASED social networking

NOKIA viNe service a real time GPS BASED social networking




Nokia has launched its GPS based “Nokia viNe” – a geotagging service.Nokia viNe is basically a prettier version of Nokia’s Sportstracker service, and uses your phone’s built-in GPS receiver to track where you go, what photos you take, and what music you’re listening to. This “vine” is then uploaded to the Nokia viNe site, so you can easily share with others. You can locate your friends on Maps through geotags. The viNe service  is compatible with some GPS enabled E and N Series handsets namely Nokia E71, Nokia N78, Nokia N79, Nokia N82, Nokia N85, Nokia N95 8GB, and Nokia N96. It uploads your media to the viNe website in order for others to keep track.This is a real-time social  networking and it has started now !!

F-SECURE ANTI THEFT MOBILE ANTI THEFT SOFTWARE MOBILE TRACKER


F-SECURE ANTI THEFT
MOBILE ANTI THEFT SOFTWARE
MOBILE TRACKER


With the new F-Secure Mobile anti-theft, you can remotely lock the phone and protect the information it contains with a single SMS message. If the phone is stolen and the thief changes the SIM card, the Theft Control feature locks the phone and informs you of the new number. As an ultimate safety measure to prevent misuse, it is possible to erase all the data on the phone with Remote Wipe.

So the key features of the new F-Secure Mobile phone anti-theft software are:

Lock your phone remotely
Erase the confidential data remotely
Get informed who stole your phone
The new F-Secure Anti-Theft for Mobile supports Symbian and Windows mobile platforms.

S60 5th Edition
S60 3rd Edition
Windows Mobile 6 Professional
Windows Mobile 6 Standard

WINDOWS 8 Vs WINDOWS 8pro WINDOWS RT


WINDOWS 8    Vs    WINDOWS 8pro   WINDOWS RT


Microsoft has announced the names of the Windows 8 Editions :

Windows 8
Windows 8 Pro
Windows RT
Windows 8 is the general x86/64 editions of Windows.Windows 8 and Windows 8 Pro Editions are for PCs and tablets powered by x86 processors (both 32 and 64 bit) .

As the name suggests , the Windows 8 Pro is designed for business/technical professionals and it sports features like encryption, virtualization, PC management and domain connectivity in addition to the all the features of the general Windows 8 OS .

Windows RT (Windows Runtime) is for the computers running on the ARM architecture. It will only be available pre-installed on PCs and tablets and supports longer battery life for the slim and compact machines.It will also feature touch-optimized desktop versions of the new Microsoft Word, Excel, PowerPoint, and OneNote.

Windows 7 to Windows 8 Upgrade :

If you are using Windows 7 Starter, Windows 7 Home Basic, or Windows 7 Home Premium then you can upgrade your OS to any of the Windows 8 or Windows 8 Pro .
If you are using Windows 7 Professional or Windows 7 Ultimate editions of the Windows 7 then you can only upgrade your OS to Windows 8 Pro .
Some of the unique features of Windows 8 Pro among other editions of the Windows 8 :

BitLocker and BitLocker To Go
Boot from VHD
Client Hyper-V
Domain Join
Encrypting File System
Group Policy
Remote Desktop (host)
Windows 8 Vs Windows 8 Pro Vs Windows RT 



FREE UPGRADE FOR WINDOWS 8 PCs


FREE UPGRADE FOR WINDOWS 8 PCs



Windows 8.1 , the next version of Windows 8 , will be available as a free upgrade from 18th October 2013 via an easy download from the Windows store for all the devices which runs on Windows 8 today.This upgrade-able version is launched nearly a year after launching Windows 8 . It will bring new features and improvements to Windows 8 such as greater personalization , Bing Smart Search, and more than 20 new and improved Microsoft apps and services. Up-gradation option is also available for those who run their systems on older versions of Windows.

People who are using older versions than Windows 8 will be able to buy Windows 8.1, either as a download from Windows.com or at your local store as a retail packaged DVD product. The pricing for Windows 8.1 and Windows 8.1 Pro varies by market but the pricing and editions for Windows 8.1 are similar to what we have today for Windows 8.

Windows 8.1 Price – $120 per PC .



Windows 8.1 does not require a previous version of Windows to be installed but it is a “full version software” , so it will be easier for those consumers who want to build PCs from scratch , run Windows 8.1 in Virtual Machine (VM) environments, or run Windows 8.1 on a second hard drive partition.

How to upgrade to Windows 8.1 using the retail DVD and downloading software :

Upgrade Windows 7 to Windows 8.1 : Consumers can upgrade a Windows 7 PC which will bring along all their files, but will require them to reinstall desktop apps including Microsoft Office.

Upgrade Windows XP & Windows Vista to Windows 8.1 : Windows 8.1 is not designed for installation on devices running Windows XP or Windows Vista. But if consumers still wants to upgrade from Windows XP or Windows Vista should buy the retail DVD instead of using the download and boot from the DVD to do a clean install of Windows 8.1. Here Consumers will need to back up their files and settings, perform clean installation, and then reinstall their files, settings and programs.

If you are planning to buy a device later this year that comes with the Windows 8.1 edition, then you can buy Windows 8.1 Pro Pack and Windows Media Center for $99.99 ERP (U.S.) . If you are on Windows 8 Pro, you can buy Windows Media Center for $9.99 (U.S.) . And if you are planning for a device now then  take advantage of PC Selector to find the right Windows 8 device, and you will be able to update your device to Windows 8.1 for free through the Windows Store.

TWO GIGA BITE EXTRA STORAGE IN GOOGLE DIRVE ON COMPLETETING ACCOUNT SECURITY CHECKUP


TWO GIGA BITE EXTRA STORAGE IN GOOGLE DIRVE ON COMPLETETING ACCOUNT SECURITY CHECKUP

google provide free additional 2gb data storage to the user who will complete their google account
security checkup the offer end on 17th feb 2015. even without any such offers it should be your
regular habit to keep checking these security settings to keep your account safe.

The security checkup has following step :

Go to Security checkup page
Recovery information – Confirm Recovery phone, Recovery email, Security question
Recent activity – review your recent account activity
Account permissions – review the apps, websites and devices connected to your Google Account. Make sure that you recognise, use and trust them all, or remove the ones you don’t
App passwords – passwords for apps that don’t use 2-Step Verification. Verify those apps
2-Step Verification settings – Verify the default phone number, backup phone number, and Backup codes
After you’ve gone through the checkup successfully, you’ll see three green checkboxes (see below) that confirm you’re eligible for the free storage and, more importantly, that you’ve taken steps to enhance your online safety. We’ll be granting the storage automatically to everyone around 28 February 2015 and we’ll send you an email when your adjustment is complete.

SAMSUNG NEW LAUNCH ROUND SMART WATCH ALONGSIED Galaxy NOTE 5


SAMSUNG NEW LAUNCH ROUND SMART WATCH ALONGSIED Galaxy NOTE 5

samungs's new product cirucular smart watch has been delayed until the second half of the
year, according to reports

Last month, Samsung quietly revealed that it is working on a round Gear smartwatch - because the company invited developers to start making apps for it in advance of a proper announcement.
Now the SDK is available, and it seems the watch has a big innovation in store.


Based on info pulled from that official software development kit, the new Gear watch will feature a rotating bezel that lets you scroll through menus and make other inputs without touching the screen. It still has a touchscreen, of course, but like the Apple Watch digital crown, it offers a way to interact without obscuring the view.

SamMobile has unearthed numerous screenshots and concept art images from the SDK, and it looks like you'll be able to use the bezel to move between contacts, scroll through options, zoom into an image, increase the volume, and a fair bit more. We've got a few of those below, but hit the source link for a deeper look at the interface.

Wednesday, 3 June 2015

GOOGLE STARTS A NEW TYPE SECURE LOGIN


GOOGLE STARTS A NEW TYPE SECURE LOGIN

google introduces a new authentication apis to boost the security of its mobile an web apps.
Google has announced a new Google Identity Platform that gives developers a suite of tools to secure apps. The new tool allows users to sign in to third party apps with their Google Login similar to the way they login into service like Gmail, Play, Google+, and other Google services.

The platform has three flagship tools including Smart Lock for Passwords, Google Sign-in and Identity Toolkit. Smart Lock comes with an integrated password manager that allows users to sign in automatically to Android apps. The feature also supports auto fills credentials on websites viewed with Chrome. Smart Lock prefills login credentials across devices and prompts the app to save a password for future use. The tools have been used by Google to secure its services internally for some time now and have extended the functionality to third-party apps and developers through APIs now.

Google Sign-in allows users to securely connect to an app or site. The feature enables users to sign in with a Google account to log onto other third-party apps that integrate Google Sign-in. According to a report, New York Times claims that it has experienced a significant increase in new user sign-ups due to the new easier Google Sign-in. Google Identity Toolkit comes with a comprehensive authentication system which the company describes allows developers to "do sign-in the right way." The toolkit grows with apps and supports email and password authentication. Nontechnical developers can utilize the toolkit with simple configuration changes that add future sign-in options and migrate existing users.

Earlier today Google has also announced a 'My account' dashboard for users provides a 'step-by-step guide' through the users most important privacy and security settings. The new tool will give users more clarity on what information the internet giant can see from profiles and will also enable users to limit Google from logging their activities on PC's and mobile devices. The internet giant has been working to boost the security of its Web and mobile apps and has started tweaking its search ranking algorithms to encourage more websites to use secure encrypted connections. Last year, the company announced encryption for all Gmail messages.

FACEBOOK START'S NEW ARTIFICIAL INTELLIGENCE LAB IN PARIS


FACEBOOK START'S NEW ARTIFICIAL INTELLIGENCE LAB IN PARIS
facebook announces new aritificial intelligens

fb has opened an AI LAB in paris to an effort to make its online social network smarter and more profitable.
the social networking giant says that it plans to use AI to research through the flood of text, pictrue
and videos on its service

The social networking giant has been investing heavily in artificial intelligence and has set up a program called Facebook AI Research. The company already has artificial intelligence research teams in Menlo Park and in New York. The new Paris AI lab has six researchers at work and will double that number by year-end. Facebook says that the recruits for the lab will come from France's top public and private technological institutions. Facebook has hired Yann LeCun, a prominent French professor at New York University specializing in "deep learning" algorithm to head the lab. The AI applications would help to "eliminate spam and, eventually, violent videos" as well as open up new advertising avenues for Facebook. The company reportedly has doubled its European users since 2010 and has more users in Europe than in the US.
All major tech companies have been investing in artificial intelligence over the past few years. Rival Google also began an AI partnership with Oxford University in Britain in 2013. It acquired AI startup Deep Mind last year for more than $500 million. The company specializes in machine learning and describes itself as a developer of "cutting-edge artificial intelligence" that can learn for itself. Google also showed off a new digital assistant called Now on Tap at its recent I/O developer conference. Facebook said in a statement, "We chose Paris for this expansion because France is home to some of the best researchers in the world." Facebook plans to work with a team of researchers in Paris and says it plans to "work openly with and invest in the AI research community in France, the EU, and beyond as we strive to make meaningful progress in these fields. It's our hope that this research will ultimately help us make services like News Feed, photos and search even better and enable an entirely new set of ways to connect and share," the company said.


Facebook also announced a new feature that allows users to add PGP-encrypted keys to their profile. The new encryption would conceal messages and passwords from email services like Gmail and Yahoo, which regularly scan user inboxes for ad-targeting purposes. Users who use PGP to encrypt their email have two keys- a private key that they keep to themselves and the other is a public key that's given to anyone who wants to send them encrypted mail. Messages are encrypted using the public key but they can only be decrypted using the private key, so users will get an end-to-end encrypted email that only they can read.

Rumors about Microsoft's upcoming Windows device the -Lumia 940 XL


Rumors about Microsoft's upcoming Windows device the -Lumia 940 XL


Nokia has reported that the Lumia 940 XL has a 5.7 inch display with 1440 x 2560 pixels resolution and has Corning Gorilla Glass 4 protection.
It will have a slim design with a metal frame.
Other reported specifications include an octa-core Snapdragon 810 processor with 3 GB of RAM.
The smartphone will have 32 GB of onboard storage as well as microSD expandable phone memory.
It will also come with Microsoft's OneDrive 15 GB free storage.
The smartphone will feature a 20 MP rear PureView camera for photos and videos, and will feature native pen support as well.
It will also feature a 5 MP front camera.
The Nokia 940 XL is expected to come with WiFi, Bluetooth 4.0 , NFC support and may also have a Type-C reversible connector.
and additional security the smartphone is expected to come with an iris scanning tech.
The Windows Phone will also come with an inbuilt accelerometer, gyro, proximity and compass sensors.
and It will pack a 3300 mAh battery.
The Lumia 940XL may also come with some new Windows 10 Mobile features like Continuum for Phones.
The report suggests that Microsoft is developing some exclusive Windows 10 Mobile features like multi window support and 3D user interaction which could be a part of 940XL.
Microsoft is also working on a 5 inch Lumia 940 smartphone which will have similar specification as the Lumia 940XL.
The Windows Phone would compete with the latest flagship devices like the Samsung Galaxy S6, HTC One M9, Sony Xperia Z3+ and LG G4.
Microsoft hasn't officially confirmed the devices, although it has stated that there will be a flagship premium Windows 10 Mobile handset launched later this year.
The company is planning to launch Windows 10 OS for desktop in July, followed by smartphones and other devices later.
Apart from this Microsoft is also reportedly planning a successor to the Lumia 830, called the Lumia 840.
The smartphone is expected to have a 13 MP Pureview camera and a 5MP front camera.
It will also have a 5 inch display and a more powerful SoC than the Lumia 830 smartphone.