Saturday 26 January 2013

Samsung's new fridge runs on Google's Android

Refrigerators are getting smart. A new model released earlier this month runs apps to help users browse recipes, create shopping lists and manage the expiration dates of items like yogurt and milk.

The T9000 refrigerator by electronics company Samsung has a 10-inch Wi-Fi-enabled touchscreen and includes apps such as Epicurious for recipes and Evernote for note-taking.

"The fridge, because it's the hub of the family and the kitchen, is now another access point without having to drag around your tablet or have your phone with you in the vicinity of where you're cooking or entertaining," said Warner Doell, a vice president in the home appliance division at Samsung Canada.

The display enables users to keep up with the news, weather and even Twitter from the fridge door. It can also replace hand-written calendars with Google Calendar integration, and run slideshows of photos, according to Doell.

Shopping lists can be created on the fridge with the Evernote app, which will sync to smartphones and recipes can be found at Epicurious.

"You can say, 'I have these ingredients in the fridge -- what can I make?' and it will show you recipes that you can prepare," said Doell.

For people who have trouble keeping track of expiration dates of food items, there's an app for that, too.

But with smartphones and tablets are already ubiquitous in homes, does the smart refrigerator offer more than novelty?

Doell said it does.

"I get asked a lot why do you need a screen on a refrigerator? And it's a good question because we're inundated with technology today," said Doell.

The main reasons, he explained, are ease-of-use in managing settings, such as the refrigerators' temperature, and for convenience because consumers are demanding pervasive connectivity.

"This isn't only about today -- it's about what will the next five to ten years look like," he added.

The T9000 is geared towards the young-minded consumer who turns to technology for convenience, according to Doell.

Whether it's to control heating, air conditioning, lighting or window coverings, Doell said that apps for home automation will be increasingly penetrating the home.

"The technology is converging across all product categories. With appliances being the traditional staid industry, it has not been fast to adopt it," said Doell, adding that Samsung plans to take a leadership role in the area.

The refrigerator runs the Android operating system, but it is not possible to install other Android apps. It will be available worldwide in the spring for a suggested retail price of $3,999.

Sony Xperia Tablet Z

Sony has officially announced its new flagship tablet, the Xperia Tablet Z. Believed to be a significant upgrade over the Xperia Tablet S, the Tablet Z runs Android 4.1 Jelly Bean OS and has a thickness of just 6.9mm.
The Xperia Tablet Z, recently leaked online, comes with a 10.1-inch display with a resolution of 1920×1200 pixels augmented by Sony's Mobile Bravia Engine, as well as Qualcomm's 1.5GHz quad-core Snapdragon S4 Pro chip, and an 8.1MP Exmor R camera.
The device has 2GB of RAM and 32GB of storage. The Sony Xperia Tablet Z has a microSD expansion slot and features Wi-Fi, Bluetooth, NFC and LTE support. The tablet is also said to be both waterproof and dustproof.
At just 6.9mm, Sony's Xperia Tablet Z is slimmer than the iPad Mini which is 7.2mm. The Sony tablet weighs 495 grams. Another notable feature of the Xperia Tablet Z is the “S-Force Front Surround 3D” which is said to improve the sound from the tablet. The tablet is likely to come with a 6,000 mAh battery.
 

Acer Liquid E1 Android 4.1 Jelly Bean

Acer has officially added the Liquid E1 to its smartphone portfolio. Acer is positioning the device as a mid-range smartphone. Acer hasn’t yet announced the pricing and availability of the device.
Under the hood, the Acer Liquid E1 has a 1GHz dual-core processor, 1GB of RAM and runs on Android 4.1 Jelly Bean straight out-of-the-box. It has a 4.5-inch display with a 960x540 pixel (qHD) resolution. The rear of the device has a 5MP camera with an LED flash whereas the front has a 0.3MP camera for video chat.
Looking at the specs, this could very well be the Acer V360 we'd heard of in December, a device that was supposed to be the company's first Jelly Bean handset.
The Liquid E1 weighs 130 grams and has dimensions of 132 x 68.5 x 9.9 mm. It also has a 1760mAh battery, and Acer claims that the battery should last for 8 hours of talk time and 400 hours of standby. The Liquid E1 has 4GB of built-in storage expandable via a microSD card. It also features an FM radio, a feature that is surprisingly absent from most high-end smartphones today.
It has been a while since Acer launched a mobile device in India, after a series of Liquid devices in 2011. The company's tablets, such as the Iconia family, have continued to make their presence felt in the Indian market however.

Latest: IPad 5 Info & IPhone 5S

Specifically, the new iPad will be "a lot smaller than one would guess was possible," he said. When held in portrait orientation, the bezels to the left and right of the 9.7-inch screen will be practically nonexistent. The space above and below the screen will be just big enough to accommodate the camera up top and Home Button down below.
"Beyond that, it's noticeably thinner, as well, which is to say the fifth-generation iPad will be smaller in every dimension than its predecessors," Gunjan said. The report notes that it's actually so much smaller and thinner than the current iPad that Apple is likely working on a full redesign of the interior.
"It wouldn't be a surprise to see the new iPad remain roughly on par with the fourth-generation model in processing capabilities, with the improved screen, dramatically lower size, and reduced weight becoming the key selling points," he added.
As for when the fifth-gen iPad will make its debut, Gunjan said Apple was originally targeting a March launch, but it now appears we'll have to wait until October, possibly because some components are limited at this time.
Meanwhile, Gunjan's sources claim the next-gen iPhone, to be called the iPhone 5S, will look near identical to the iPhone 5, but with a larger rear flash. The iPhone 5S, as well as the much-rumored low-cost iPhone with a plastic shell, will both be released at some point this year.
In addition, the rumored "iPhone Math" phone, which we first heard about earlier this week, is currently in "early prototyping stages," but will not arrive this year.
"It supposedly has a 4.7-inch screen, at least for the time being,"  Gunjan said. "It might never make it to market, and plenty could change before it does. Consider it Apple's 'just in case / Plan B' hedge against ever-growing Android phone screen sizes."

Latest : Huawei’s Ascend P2 Info

The Ascend P2 is expected to have a 5-inch 720p HD IPS display, 1.8GHz quad-core Hi-Silicon K3V2 processor along with 2GB of RAM. It has 8GB built-in storage and runs on Android 4.1 Jelly Bean straight out-of-the-box. A 3,000mAh Li-on battery is supposed to power it.
The device is expected to be 6.45mm thin, so it’s a little surprising to see that the device is so thin and yet houses a 13MP camera.

More

The Ascend Mate has a 6.1-inch display with a 1280x720 IPS+ display and has a 1.5 GHz Hi-Silicon quad-core processor under the hood combined with 2GB of RAM. It runs on Android 4.1 Jelly Bean straight out of the box and is powered by a 4050mAh battery. The Android OS is skinned with Huawei’s Emotion interface. It has an 8MP AF rear-facing camera with HDR and 1MP HD front-facing camera for video calls.

The Ascend D2 will sport a 5-inch IPS display has a resolution of 1920x1280p and runs on Android 4.1 Jelly Bean straight out of the box. The OS is skinned with Huawei’s Emotion interface. In terms of specifications under the hood, the D2 has Huawei’s K3V2 1.5 GHz quad-core CPU along with 2GB of RAM. It has a whopping 13MP BSI rear-facing camera along with a 1.3MP front-facing camera for video calls. It also sports a 3000mAh battery.

 

'World’s first 3D-printed building coming in 2014'

A Dutch architect plans to construct the world's first 3D printed building inspired by the Earth's landscape. Janjaap Ruijssenaars hopes to create the buildings, which he estimates will cost £3.3million- £4.2 million.
The 3D buildings — a more direct way of constructing — will resemble a giant mobius strip — a continuous loop with only one side, 'BBC News' reported. Ruijssenaars is working with large-scale 3D printing expert Enrico Dini on the project. The industrial sized 3D printer uses sand and a special binding agent to create a "marble like material" stronger than cement.

However, the 1,000-sq-m buildings would still require concrete reinforcements , he said.
"For me as an architect it's been a nice way to construct this specific design — it has no beginning and no end and with the 3D printer we can make it look like that. In traditional construction you have to make a mould of wood and you fill it with concrete and then you take out the wood — it's a waste of time. You can print what you want — it's a more direct way of constructing ," he said. He said the first "landscape house" should be in position by 2014.

Friday 25 January 2013

Indian insurers to spend Rs 101 billion on IT in 2013

Indian insurance companies will spend Rs 101 billion on IT products and services in 2013, an increase of more than 9% over 2012 revenue of Rs 92.5 billion, according to Gartner Inc. This forecast includes spending by insurers on internal IT (including personnel), hardware, software, external IT services and telecommunications.

IT services has overtaken telecommunications to become the biggest spending segment, and is forecast to reach Rs 30.6 billion in 2013, up from Rs 27 billion in 2012. IT services is achieving the highest growth rate amongst the top level IT spending segments - forecast to exceed 13% in 2013, with growth of 23.4% forecast for business process outsourcing services. Consulting is also a high growth segment at over 18.2% in 2013.

"We are continuing to see Indian insurers lead the charge to outsourcing and business process outsourcing," said Derry Finkeldey, principal analyst at Gartner. "The Indian insurance industry is experiencing huge growth in transaction volumes, and Indian consumers are quite progressive in terms of seeking online and mobile services. Insurers are turning to experienced IT vendors to help them navigate the inevitable complexity this is producing."

"The Indian domestic market for IT services is dynamic and highly competitive - with many of the leading names focused on the insurance sector and offering their own proprietary solutions for the industry. This competitiveness is ultimately great for insurance buyers," he added.

Samsung quarterly profit jumps 76 per cent on smartphone and memory chip sales

South Korea's Samsung Electronics said on Friday net profit soared 75.6 per cent to a record 7.04 trillion won ($6.6 billion) in the fourth quarter of 2012, driven by strong smartphone and memory chip sales.
The world's largest technology firm by revenue and top smartphone maker also saw a record operating profit in October-December of 8.84 trillion won, up 89.7 per cent from a year earlier.

The figures were largely in line with Samsung's guidance released earlier this month.

For all of 2012, Samsung logged a net profit of 23.8 trillion won, with revenue and operating income reaching 201.1 trillion won and 29.05 trillion won respectively.

The company said growth in the fourth quarter was mainly driven by "solid sales" of its flagship Galaxy S3 and Galaxy Note 2 smartphones.

IT and Mobile Communications accounted for the lion's share of operating profit in the fourth quarter, racking up 5.44 trillion won on revenue of 31.32 trillion won.

However, Samsung cautioned that the "furious growth spurt" in the global smartphone market in 2012 would be "pacified" this year by intensifying price competition compounded by a slew of new products.

"In the first quarter, demand for smartphones in developed countries is expected to decelerate," it said in a statement.

Samsung's growth momentum still remains faster than smartphone rival Apple's, and analysts expect it to stay that way for much of the year due to a larger mix of products.

While shares in Samsung have climbed 12 percent over the past three months, Apple has slumped 20 per cent.

The California-based company announced record quarterly profits on Wednesday, but investors soured on forecasts of levelling growth and reduced profit margins.

While Samsung does not provide figures for quarterly smartphone shipments, analysts estimate the company sold 63 million smartphones on total handset sales of 110.5 million units.

The company's chip, display panel and consumer electronics divisions also saw an improvement in their quarterly results.

Memory chip business contributed $1.3 billion in operating profits, a 39 per cent quarterly increase. However, Samsung warned demand in the first quarter of 2013 would be tempered by a seasonal drop in PC and mobile device sales.

Although demand was weak for PC DRAM during the fourth quarter, the semiconductor unit posted $8.97 billion in sales, a 10 percent increase quarter over quarter.

October-December saw strong sales of LED TVs, but the global downturn resulted in slipping demand for home appliances in general, despite a rise in sales of high-end refrigerators and washers in the United States and Europe.

"Despite uncertainties in Europe and concerns over the US fiscal cliff... we did our best this quarter to achieve strong earnings based on... high value-added products as well as our technological competitiveness," Investor Relations chief Robert Yi said in a statement.

"Heading into this year, we are expecting a slow recovery in the component business due to reduced capital expenditures, while competition in the set business will intensify further as demand slows," Yi said.

China's mobile users crosses 1.11 billion in 2012

China, with a population of over 1.3 billion now has 1.11 billion mobile phone users, according to official data released.

The Ministry of Industry and Information Technology (MIIT) said in a statement that mobile phone users represent 80 per cent of all phones users in the country.

As per recent released data, China's population stood at 1.354 billion at the end of 2012, 6.69 million more than that at the end of 2011.

The number of mobile phones owned by every 100 people reached 82.6 by the end of 2012, state-run Xinhua news agency reported.

Last year China crossed a billion mark and recorded 125.9 million new mobile phone users, among whom 104.38 million were 3G mobile phone users, bringing the total number of 3G users to 232.8 million, the MIIT said.

The ministry said the number of Internet users rose by 51 million to 564 million people, among whom 74.5 per cent, or 420 million people, surf the Internet with their mobile phones.

The Internet penetration rate reached 42.1 per cent by the end of last year, up 3.8 percentage points from a year earlier.

Whereas, the mobile internet boom continues in the country and it is also fast emerging as new medium posing a major challenge to the official media's monopoly in the country.

Social networking websites like Twitter and Facebook are banned in China but the number of Chinese microbloggers, akin to Twitter this year crossed 274 million mark, the largest in the world as internet medium has emerged as the main stay of public expression in a tightly controlled official media set up in China.

According to data released by China Internet Network Information Centre, (CINIC) last month 274 million Chinese had microblog accounts as of June last year most of them were operated through mobile phones.

The number of Internet users in China rose to 538 million by June last year, meaning that four out of ten Chinese access the Internet, the CINIC report said.

It is estimated that by 2015 China will have more than 800 million Internet users, one quarter of which will be from rural areas.

Domestic IT market: What will drive growth in 2013

New implementations of business software (like enterprise resource planning software) and efforts towards modernization of IT infrastructure will drive the domestic technology market, according to Forrester Research.

This is quite a contrast to 2012, which was a relatively lackluster year for the tech market in India. Worse-than-expected economic growth combined with political gridlock on economic reforms kept the tech market from reaching its full potential in 2012.

Some dynamic pockets of growth existed nonetheless, mostly within Indian companies in the process of globalizing their activities. In these companies, Forrester has witnessed large business software implementations, as well as modernization projects for their IT infrastructure assets.

These investments will continue to drive growth in 2013 in the private sector side of the market. The public sector represents a significant growth opportunity for India's IT spending growth, although the market will experience a slow 7 per cent growth in rupees through 2014 due to the parliamentary elections scheduled for 2014, says a Forrester release.

Computer equipment will continue to lead the Indian tech market: Computer equipment is the largest category of IT purchases and will equal $11 billion in 2013.

Communications equipment growth will slow down in 2013: Following the government's decision to cancel 122 2G licenses allotted in 2008, telecom service providers had to re-acquire the licenses in late 2012. These new payments will significantly weaken the balance sheets of most telecom providers in 2013.

Software and IT consulting markets will be driven by new tech investments in 2013: Cloud, mobility, business analytics, and social are increasingly attracting interest from Indian organizations. The lack of internal technical and management skills will push them to leverage external service providers.

IT outsourcing services will grow faster, but the maturity level will remain low in 2013: At 13 pc growth, this market segment will continue to enjoy above average growth in 2013.

The maturity of these deals has been slow to increase, although Forrester expects that the increasingly complex business, infrastructure, and applications environment will push companies to hand over more responsibilities to the service provider. 

Samsung Galaxy Note II, S III security flaw found

A security loophole in Samsung devices running on the Exynos 4 System on Chip (SoC) has been found. This flaw is in the kernel and hands over the access of the physical memory of the phone to any user and opens it up to malware.

A developer who goes by the name Alephzain on the forum XDA-developers came across a flaw in his Samsung Galaxy S III while trying to root it. He posted, "The good news is we can easily obtain root on these devices and the bad is there is no control over it."

The devices that can be compromised by this loophole include Galaxy Note II, Galaxy S II, Meizu MX and all others with Exynos 4210 and 4412 chipset with Samsung kernel sources, says Alephzain.

However, another XDA developer has already found a fix to the problem, though it will render the phone's camera useless. The developer, Chainfire, has released an application called ExynosAbuse, which will boot before all others, including any malicious apps, and stop them from executing when the phone is turned on.

Samsung to post record quarterly profit of $8.3 billion

Samsung Electronics, the world's largest technology company by revenue, expects record earnings for the fourth quarter of 2012 as shoppers continued to snap up its smartphones and tablets.

The company said its operating profit for the October-December quarter would be about 8.8 trillion won ($8.3 billion), up 89 per cent from a year earlier and higher than expectations. It will release its full quarterly result including net profit at the end of this month.

The maker of Galaxy smartphones and tablets said fourth quarter revenue likely rose 18 per cent from a year earlier to 56 trillion won.

Analysts said nearly 70 percent of the operating income for the quarter was likely generated by Samsung's mobile division that makes and sells smartphones and tablets.

Samsung's mobile business, which recently overtook Apple in smartphone sales and Nokia in mobile handsets, has driven Samsung's earnings growth in recent quarters. Samsung's quarterly operating profit has risen steadily since the final quarter of 2011, while rival mobile-phone makers such as Nokia, Research In Motion and HTC have experienced falling market share and profits.

Samsung shipped at least 60 million smartphones in the last quarter of 2012, according to analysts' estimates, about 10 percent growth from the previous quarter.

The launch in September of the Galaxy Note II, a giant smartphone with a 5.5-inch screen and a digital pen, helped Samsung retain its market dominance during the Christmas holiday season despite competition from Apple's iPhone 5, analysts said. Samsung's flagship Android device, the Galaxy S III, also sold strongly.

Jin Sung-hye, an analyst at KTB Securities, estimated Samsung shipped 15 million S III smartphones and 7 million of the Note II during the final three months of 2012. The surprise popularity of the Note II device prompted other handset makers to increase the screen size of their smartphones as consumers embrace a wider mobile-phone screen to watch videos.

Market watchers speculate that Samsung will introduce a new Galaxy S smartphone, likely to be named the Galaxy S IV, before the end of April. Samsung usually rolls out the latest iteration of its Android-based flagship smartphone before the end of the second quarter, taking advantage of the time when rivals are months away from introducing new smartphone models.

With the early rollouts of the new Galaxy S model and an update to the Note series later in the year, analysts predict Samsung will sell at least 300 million smartphones in 2013, widening its lead over Apple. Samsung's smartphone shipments likely surpassed 200 million for the first time in 2012.

The company plans to act more aggressively to increase its share of the tablet PC market this year, which is still dominated by Apple's iPad, its executives said in an October conference call. The release of mini tablets that are between the size of smartphones and standard tablets also opens up a new growth area for Samsung.

While the mobile phone division has replaced Samsung's semiconductor business as the biggest profit generator, robust demand for smartphones around the world is benefiting Samsung's semiconductor operation as well. The company is the world's largest supplier of TVs and memory chips.

Analysts said Samsung's semiconductor division fared better in the last quarter than the quarter before as higher Samsung phone sales and launches of new mobile products by its customers lifted demand for Samsung's mobile processors.

In the first quarter of this year, market watchers said the strengthening of the South Korean currency against the US dollar and the Japanese yen could hurt Samsung's component businesses, which is facing seasonally weak demand for TVs and display panels. But others predict Samsung will ship more smartphones than the previous quarter, which could outweigh lower TV and panel sales.

The South Korean company has been in global legal battles with Apple, one of its biggest clients, for nearly two years. Last month, Samsung dropped its bid to seek a sales ban against Apple's mobile products in Europe, saying it would like to protect consumer choice. Samsung, which is under investigations by the European Commission over its practice of licensing key mobile patents, is maintaining its lawsuits against the iPhone maker in other countries.

Shares of Samsung Electronics fell 1 percent in Seoul after earnings release. Samsung's shares, which gained 11 percent in the fourth quarter, hit a record high level earlier this month.

If Samsung's fourth quarter results are in line with Tuesday's guidance, the company will report 29 trillion won ($27.3 billion) operating profit on revenue of 201.1 trillion won ($189 billion) for 2012. 

Samsung smartphone sales touch 63 million in Q4: Report

Samsung Electronics, the world's top handset maker, sold 63 million smartphones in the fourth quarter and commanded a 29 percent share of the global smartphone market, a report by research firm Strategy Analytics showed on Friday.

In 2012, Samsung sold 213 million smartphones with a 30 percent market share, followed by Apple, which sold 135.8 million iPhones with a 19 percent market share, the report said.

The company said in Friday's earnings call that net profit soared 75.6 per cent to a record 7.04 trillion won ($6.6 billion) in the fourth quarter of 2012, driven by strong smartphone and memory chip sales.

The world's largest technology firm by revenue and top smartphone maker also saw a record operating profit in October-December of 8.84 trillion won, up 89.7 per cent from a year earlier.

The figures were largely in line with Samsung's guidance released earlier this month.

For all of 2012, Samsung logged a net profit of 23.8 trillion won, with revenue and operating income reaching 201.1 trillion won and 29.05 trillion won respectively.

The company said growth in the fourth quarter was mainly driven by "solid sales" of its flagship Galaxy S3 and Galaxy Note 2 smartphones.

Nokia 808 PureView with 41MP camera becomes last Symbian device

 Embattled mobile maker Nokia has announced that the firm will stop producing its Symbian smartphone operating system.

In its earnings announcement, the Finland-based firm confirmed that the 808 PureView was the last new device.

The firm had earlier noted that Q4 2012 was the "last meaningful quarter for Symbian", and the new confirmation was not a surprise to industry observers, the Telegraph reports.

According to the report, Nokia's earnings release revealed that it sold 2.2 million Symbian units in Q4 2012, half as many as the Lumia range at 4.4 million.

Symbian was less than 14 per cent of the overall 15.9million smartphones.

Symbian was the biggest operating system in the world until it was overtaken by Apple, and was used from 1998 when it was a multi-brand proposition from Nokia, Ericsson, Motorola and Psion.

Nokia took complete control of it in 2008.

Samsung Galaxy S IV

The launch of Samsung Galaxy S IV looks like much-anticipated event in the smartphone industry. The device will take over the mantle of the South Korean company's flagship device from Galaxy S III, which recently clocked 40 million in sales. There have been rumours of the device's specifications for long, but now a potential launch date for the upcoming smartphone has also come to the fore.

Technology blog IT Professional has said in a report that the biggest phone maker in the world will host a Samsung Unpacked event either towards the end of February or in March this year. The device will start shipping from Week 16, which translates to April 15, 2013.

The report also says that the upcoming Galaxy S IV will feature wireless charging, and the wireless charging kit will be shipped a couple of weeks after the device starts selling. The battery capacity of the smartphone will be 2600mAh, as compared to the 21,00mAh in the current flagship. Samsung Galaxy S IV is said to be initially launched in two colours - white and black.

Another tidbit revealed by IT Professional is that the smartphone is now being developed under the codename Project Altius (J). Till now, it was being developed under the moniker Project J, named after JK Shin, the president of the Samsung's mobile division. The device has been codenamed GT-I9500, says the post.

Previously, a section in Samsung's booth at Consumer Electronics Show 2013 revealed details of the display of Galaxy S IV - 4.99-inch SuperAMOLED full-HD touchscreen with 440ppi pixel density. It is said that the upcoming phone's screen will be unbreakable and bendable, as demonstrated with the Youm display at CES 2013. Galaxy S IV is expected to run on a quad-core processor clocked at 2GHz, 2GB RAM, 13MP rear camera.

Thursday 24 January 2013

Latest:Samsung Galaxy Note 8.0 Info

Galaxy Note 8.0 will be available in 16 and 32GB variants with microSD card support up to 32GB. The image shows that the device has a 1.6GHz processor and the report in SamMobile says it has 2GB RAM. Coming to the imaging capabilities of Samsung Galaxy Note 8.0, it is likely to have a 5MP camera on the rear and a 1.3MP snapper in the front.

Samsung will launch two versions of the tablet, depending on the connectivity suite, says the report. While model number GT-N5100 will have cellular data as well as Wi-Fi, the version named GT-N5110 will be a Wi-Fi-only unit. Other connectivity options in the device will be Bluetooth 4.0 and microUSB 2.0. The tablet is said to weigh 330gm and run on a 4,600mAh battery.

Galaxy Note 8.0 is expected to be officially announced at Mobile World Congress in February this year. Tech news website DigiTimes has said that the price of Samsung's upcoming tablet with 8-inch screen will be between $249 and $299. This translates to a price tag of Rs 13,000 to Rs 16,000. It remains to be seen whether Samsung launches this device in India in a comparable price band. Many were let down by Google Nexus 7, which starts at $199 (approximately Rs 11,000), but is officially priced at Rs 19,999 in the Indian market.

This device will be closer to Apple iPad mini in terms of dimensions as Samsung's 7-inch Galaxy Tab 2 as well as Google's Nexus 7 fall short when it comes to screen size. This will be the second Samsung tablet that measures between 7- and 10-inch, after Galaxy Tab 7.7. It will be only the fourth device in the South Korean manufacturer's Note line-up, which was launched in 2011.
 

New Technology

New Technology Will Be Launched in June,2013.
Our 3G network changes to 4G.
The Highspeed Networks all over India.
All at Lower Price Point.
Nearly 200MBPS speed with 4G network.
Important Note: don't buy phone,tablet with 3G wait for few months to buy 4G tablets,phone,more.
Reply this message to all.Tanks for reading.
By:Dholariya Gunjan J.

Modern print technology

Modern print technology

The following printing technologies are routinely found in modern printers:

 Toner-based printers

A laser printer rapidly produces high quality text and graphics. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.
Another toner-based printer is the LED printer which uses an array of LEDs instead of a laser to cause toner adhesion to the print drum.

 Liquid inkjet printers

Inkjet printers operate by propelling variably sized droplets of liquid ink onto almost any sized page. They are the most common type of computer printer used by consumers.

 Solid ink printers

Solid ink printers, also known as phase-change printers, are a type of thermal transfer printer. They use solid sticks of CMYK-coloured ink, similar in consistency to candle wax, which are melted and fed into a piezo crystal operated print-head. The printhead sprays the ink on a rotating, oil coated drum. The paper then passes over the print drum, at which time the image is immediately transferred, or transfixed, to the page. Solid ink printers are most commonly used as colour office printers, and are excellent at printing on transparencies and other non-porous media. Solid ink printers can produce excellent results. Acquisition and operating costs are similar to laser printers. Drawbacks of the technology include high energy consumption and long warm-up times from a cold state. Also, some users complain that the resulting prints are difficult to write on, as the wax tends to repel inks from pens, and are difficult to feed through automatic document feeders, but these traits have been significantly reduced in later models. In addition, this type of printer is only available from one manufacturer, Xerox, manufactured as part of their Xerox Phaser office printer line. Previously, solid ink printers were manufactured by Tektronix, but Tek sold the printing business to Xerox in 2001.

 Dye-sublimation printers

A dye-sublimation printer (or dye-sub printer) is a printer which employs a printing process that uses heat to transfer dye to a medium such as a plastic card, paper or canvas. The process is usually to lay one colour at a time using a ribbon that has colour panels. Dye-sub printers are intended primarily for high-quality colour applications, including colour photography; and are less well-suited for text. While once the province of high-end print shops, dye-sublimation printers are now increasingly used as dedicated consumer photo printers.

 Inkless printers

Thermal printers work by selectively heating regions of special heat-sensitive paper. Monochrome thermal printers are used in cash registers, ATMs, gasoline dispensers and some older inexpensive fax machines. Colours can be achieved with special papers and different temperatures and heating rates for different colours; these coloured sheets are not required in black-and-white output. One example is the ZINK technology (Zero INK Technology).
Xerox is working on an inkless printer which will use a special reusable paper coated with a few micrometres of UV light sensitive chemicals. The printer will use a special UV light bar which will be able to write and erase the paper. As of early 2007 this technology is still in development and the text on the printed pages can only last between 16–24 hours before fading.

Obsolete and special-purpose printing technologies

The following technologies are either obsolete, or limited to special applications though most were, at one time, in widespread use.
Impact printers rely on a forcible impact to transfer ink to the media. The impact printer uses a print head that either hits the surface of the ink ribbon, pressing the ink ribbon against the paper (similar to the action of a typewriter), or hits the back of the paper, pressing the paper against the ink ribbon (the IBM 1403 for example). All but the dot matrix printer rely on the use of formed characters, letterforms that represent each of the characters that the printer was capable of printing. In addition, most of these printers were limited to monochrome printing in a single typeface at one time, although bolding and underlining of text could be done by "overstriking", that is, printing two or more impressions in the same character position. Impact printers varieties include, typewriter-derived printers, teletypewriter-derived printers, daisy wheel printers, dot matrix printers and line printers. Dot matrix printers remain in common use in businesses where multi-part forms are printed, such as car rental services. An overview of impact printing contains a detailed description of many of the technologies used.
Pen-based plotters were an alternate printing technology once common in engineering and architectural firms. Pen-based plotters rely on contact with the paper (but not impact, per se) and special purpose pens that are mechanically run over the paper to create text and images.

 Typewriter-derived printers

Several different computer printers were simply computer-controllable versions of existing electric typewriters. The Friden Flexowriter and IBM Selectric typewriter were the most-common examples. The Flexowriter printed with a conventional typebar mechanism while the Selectric used IBM's well-known "golf ball" printing mechanism. In either case, the letter form then struck a ribbon which was pressed against the paper, printing one character at a time. The maximum speed of the Selectric printer (the faster of the two) was 15.5 characters per second.

 Teletypewriter-derived printers

The common teleprinter could easily be interfaced to the computer and became very popular except for those computers manufactured by IBM. Some models used a "typebox" that was positioned, in the X- and Y-axes, by a mechanism and the selected letter form was struck by a hammer. Others used a type cylinder in a similar way as the Selectric typewriters used their type ball. In either case, the letter form then struck a ribbon to print the letterform. Most teleprinters operated at ten characters per second although a few achieved 15 CPS.

 Daisy wheel printers

Daisy wheel printers operate in much the same fashion as a typewriter. A hammer strikes a wheel with petals, the "daisy wheel", each petal containing a letter form at its tip. The letter form strikes a ribbon of ink, depositing the ink on the page and thus printing a character. By rotating the daisy wheel, different characters are selected for printing. These printers were also referred to as letter-quality printers because, during their heyday, they could produce text which was as clear and crisp as a typewriter, though they were nowhere near the quality of printing presses. The fastest letter-quality printers printed at 30 characters per second.

 Dot-matrix printers

A Tandy 1000 HX with a Tandy DMP-133 dot-matrix printer
In the general sense many printers rely on a matrix of pixels, or dots, that together form the larger image. However, the term dot matrix printer is specifically used for impact printers that use a matrix of small pins to create precise dots. The advantage of dot-matrix over other impact printers is that they can produce graphical images in addition to text; however the text is generally of poorer quality than impact printers that use letterforms (type).
Dot-matrix printers can be broadly divided into two major classes:
  • Ballistic wire printers
  • Stored energy printers
Dot matrix printers can either be character-based or line-based (that is, a single horizontal series of pixels across the page), referring to the configuration of the print head.
At one time, dot matrix printers were one of the more common types of printers used for general use, such as for home and small office use. Such printers would have either 9 or 24 pins on the print head. 24-pin print heads were able to print at a higher quality. Once the price of inkjet printers dropped to the point where they were competitive with dot matrix printers, dot matrix printers began to fall out of favor for general use.
Some dot matrix printers, such as the NEC P6300, can be upgraded to print in colour. This is achieved through the use of a four-colour ribbon mounted on a mechanism (provided in an upgrade kit that replaces the standard black ribbon mechanism after installation) that raises and lowers the ribbons as needed. Colour graphics are generally printed in four passes at standard resolution, thus slowing down printing considerably. As a result, colour graphics can take up to four times longer to print than standard monochrome graphics, or up to 8-16 times as long at high resolution mode.
Dot matrix printers are still commonly used in low-cost, low-quality applications like cash registers, or in demanding, very high volume applications like invoice printing. The fact that they use an impact printing method allows them to be used to print multi-part documents using carbonless copy paper, like sales invoices and credit card receipts, whereas other printing methods are unusable with paper of this type. Dot-matrix printers are now (as of 2005) rapidly being superseded even as receipt printers.

 Line printers

Line printers, as the name implies, print an entire line of text at a time. Three principal designs existed. In drum printers, a drum carries the entire character set of the printer repeated in each column that is to be printed. In chain printers, also known as train printers, the character set is arranged multiple times around a chain that travels horizontally past the print line. In either case, to print a line, precisely timed hammers strike against the back of the paper at the exact moment that the correct character to be printed is passing in front of the paper. The paper presses forward against a ribbon which then presses against the character form and the impression of the character form is printed onto the paper.
Comb printers, also called line matrix printers, represent the third major design. These printers were a hybrid of dot matrix printing and line printing. In these printers, a comb of hammers printed a portion of a row of pixels at one time, such as every eighth pixel. By shifting the comb back and forth slightly, the entire pixel row could be printed, continuing the example, in just eight cycles. The paper then advanced and the next pixel row was printed. Because far less motion was involved than in a conventional dot matrix printer, these printers were very fast compared to dot matrix printers and were competitive in speed with formed-character line printers while also being able to print dot matrix graphics.
Line printers were the fastest of all impact printers and were used for bulk printing in large computer centres. They were virtually never used with personal computers and have now been replaced by high-speed laser printers. The legacy of line printers lives on in many computer operating systems, which use the abbreviations "lp", "lpr", or "LPT" to refer to printers.

 Liquid ink electrostatic printer

Liquid ink electrostatic printer use a chemical coated paper, which is charged by the print head according to the image of the document. The paper is passed near a pool of liquid ink with the opposite charge. The charged areas of the paper attract the ink and thus form the image. This process was developed from the process of electrostatic copying. Color reproduction is very accurate, and because there is no heating the scale distortion is less than ±0.1%. (All laser printers have an accuracy of ±1%).
Worldwide, most survey offices used this printer before color inkjet plotters become popular. Liquid ink electrostatic printers were mostly available in 36 inches to 54 inches width and also 6 color printing. These were also used to print large billboards. It was first introduced by Versatec, which was later bought by Xerox. 3M also used to make these printers.

 Pen-based plotters

A plotter is a vector graphics printing device which operates by moving a pen over the surface of paper. Plotters have been used in applications such as computer-aided design, though they are rarely used now and are being replaced with wide-format conventional printers, which nowadays have sufficient resolution to render high-quality vector graphics using a rasterized print engine. It is commonplace to refer to such wide-format printers as "plotters", even though such usage is technically incorrect. There are two types of plotters, flat bed and drum.

 Other printers

A number of other sorts of printers are important for historical reasons, or for special purpose uses:
  • Digital minilab (photographic paper)
  • Electrolytic printers
  • Spark printer
  • Barcode printer multiple technologies, including: thermal printing, inkjet printing, and laser printing barcodes
  • Billboard / sign paint spray printers
  • Laser etching (product packaging) industrial printers
  • Microsphere (special paper)

Printer

In computing, a printer is a peripheral which produces a representation of an electronic document on physical media such as paper or transparency film. Many printers are local peripherals connected directly to a nearby personal computer. Individual printers are often designed to support both local and network connected users at the same time. Some printers can print documents stored on memory cards or from digital cameras and scanners. Multifunction printers (MFPs) include a scanner and can copy paper documents or send a fax; these are also called multi-function devices (MFD), or all-in-one (AIO) printers. Most MFPs include printing, scanning, and copying among their many features.
Consumer and some commercial printers are designed for low-volume, short-turnaround print jobs; requiring virtually no setup time to achieve a hard copy of a given document. However, printers are generally slow devices (30 pages per minute is considered fast, and many inexpensive consumer printers are far slower than that), and the cost per page is actually relatively high. However, this is offset by the on-demand convenience and project management costs being more controllable compared to an out-sourced solution. The printing press remains the machine of choice for high-volume, professional publishing. However, as printers have improved in quality and performance, many jobs which used to be done by professional print shops are now done by users on local printers; see desktop publishing. Local printers are also increasingly taking over the process of photofinishing as digital photo printers become commonplace.
The world's first computer printer was a 19th century mechanically driven apparatus invented by Charles Babbage for his difference engine.
A virtual printer is a piece of computer software whose user interface and API resembles that of a printer driver, but which is not connected with a physical computer printer.

Money

Money is any object or record that is generally accepted as payment for goods and services and repayment of debts in a given socio-economic context or country. The main functions of money are distinguished as: a medium of exchange; a unit of account; a store of value; and, occasionally in the past, a standard of deferred payment. Any kind of object or secure verifiable record that fulfills these functions can be considered money.
Money is historically an emergent market phenomenon establishing a commodity money, but nearly all contemporary money systems are based on fiat money.Fiat money, like any check or note of debt, is without intrinsic use value as a physical commodity. It derives its value by being declared by a government to be legal tender; that is, it must be accepted as a form of payment within the boundaries of the country, for "all debts, public and private". Such laws in practice cause fiat money to acquire the value of any of the goods and services that it may be traded for within the nation that issues it.
The money supply of a country consists of currency (banknotes and coins) and bank money (the balance held in checking accounts and savings accounts). Bank money, which consists only of records (mostly computerized in modern banking), forms by far the largest part of the money supply in developed nations.

History
The use of barter-like methods may date back to at least 100,000 years ago, though there is no evidence of a society or economy that relied primarily on barter. Instead, non-monetary societies operated largely along the principles of gift economics and debt. When barter did in fact occur, it was usually between either complete strangers or potential enemies.
Many cultures around the world eventually developed the use of commodity money. The shekel was originally a unit of weight, and referred to a specific weight of barley, which was used as currency. The first usage of the term came from Mesopotamia circa 3000 BC. Societies in the Americas, Asia, Africa and Australia used shell money – often, the shells of the money cowry (Cypraea moneta L. or C. annulus L.). According to Herodotus, the Lydians were the first people to introduce the use of gold and silver coins.It is thought by modern scholars that these first stamped coins were minted around 650–600 BC.
 
The system of commodity money eventually evolved into a system of representative money. This occurred because gold and silver merchants or banks would issue receipts to their depositors – redeemable for the commodity money deposited. Eventually, these receipts became generally accepted as a means of payment and were used as money. Paper money or banknotes were first used in China during the Song Dynasty. These banknotes, known as "jiaozi", evolved from promissory notes that had been used since the 7th century. However, they did not displace commodity money, and were used alongside coins. In the 13th century, paper money became known in Europe through the accounts of travelers, such as Marco Polo and William of Rubruck.Marco Polo's account of paper money during the Yuan Dynasty is the subject of a chapter of his book, The Travels of Marco Polo, titled "How the Great Kaan Causeth the Bark of Trees, Made Into Something Like Paper, to Pass for Money All Over his Country." Banknotes were first issued in Europe by Stockholms Banco in 1661, and were again also used alongside coins. The gold standard, a monetary system where the medium of exchange are paper notes that are convertible into pre-set, fixed quantities of gold, replaced the use of gold coins as currency in the 17th-19th centuries in Europe. These gold standard notes were made legal tender, and redemption into gold coins was discouraged. By the beginning of the 20th century almost all countries had adopted the gold standard, backing their legal tender notes with fixed amounts of gold.
After World War II, at the Bretton Woods Conference, most countries adopted fiat currencies that were fixed to the US dollar. The US dollar was in turn fixed to gold. In 1971 the US government suspended the convertibility of the US dollar to gold. After this many countries de-pegged their currencies from the US dollar, and most of the world's currencies became unbacked by anything except the governments' fiat of legal tender and the ability to convert the money into goods via payment.

What is Technology?

Technology is the making, modification, usage, and knowledge of tools, machines, techniques, crafts, systems, methods of organization, in order to solve a problem, improve a preexisting solution to a problem, achieve a goal, handle an applied input/output relation or perform a specific function. It can also refer to the collection of such tools, machinery, modifications, arrangements and procedures. Technologies significantly affect human as well as other animal species' ability to control and adapt to their natural environments. The word technology comes from Greek τεχνολογία (technología); from τέχνη (téchnē), meaning "art, skill, craft", and -λογία (-logía), meaning "study of-".The term can either be applied generally or to specific areas: examples include construction technology, medical technology, and information technology.
The human species' use of technology began with the conversion of natural resources into simple tools. The prehistorical discovery of the ability to control fire increased the available sources of food and the invention of the wheel helped humans in travelling in and controlling their environment. Recent technological developments, including the printing press, the telephone, and the Internet, have lessened physical barriers to communication and allowed humans to interact freely on a global scale. However, not all technology has been used for peaceful purposes; the development of weapons of ever-increasing destructive power has progressed throughout history, from clubs to nuclear weapons.
Technology has affected society and its surroundings in a number of ways. In many societies, technology has helped develop more advanced economies (including today's global economy) and has allowed the rise of a leisure class. Many technological processes produce unwanted by-products, known as pollution, and deplete natural resources, to the detriment of the Earth and its environment. Various implementations of technology influence the values of a society and new technology often raises new ethical questions. Examples include the rise of the notion of efficiency in terms of human productivity, a term originally applied only to machines, and the challenge of traditional norms.
Philosophical debates have arisen over the present and future use of technology in society, with disagreements over whether technology improves the human condition or worsens it. Neo-Luddism, anarcho-primitivism, and similar movements criticise the pervasiveness of technology in the modern world, opining that it harms the environment and alienates people; proponents of ideologies such as transhumanism and techno-progressivism view continued technological progress as beneficial to society and the human condition. Indeed, until recently, it was believed that the development of technology was restricted only to human beings, but recent scientific studies indicate that other primates and certain dolphin communities have developed simple tools and learned to pass their knowledge to other generations.

Data Analysis

Data retrieval

The relational database model introduced a programming language independent Structured Query Language (SQL), based on relational algebra.
The terms "data" and "information" are not synonymous. Anything stored is data, but it only becomes information when it is organised and presented meaningfully.Most of the world's digital data is unstructured, and stored in a variety of different physical formats even within a single organisation. Data warehouses began to be developed in the 1980s to integrate these disparate stores. They typically contain data extracted from various sources, including external sources such as the Internet, organised in such a way as to facilitate decision support systems (DSS).

 Data transmission

Data transmission has three aspects: transmission, propagation, and reception.
XML has been increasingly employed as a means of data interchange since the early 2000s,particularly for machine-oriented interactions such as those involved in web-oriented protocols such as SOAP,describing "data-in-transit rather than ... data-at-rest". One of the challenges of such usage is converting data from relational databases into XML Document Object Model (DOM) structures.

 Data manipulation

Hilbert and Lopez  identify the exponential pace of technological change (a kind of Moore's law): machines' application-specific capacity to compute information per capita roughly doubled every 14 months between 1986 and 2007; the per capita capacity of the world's general-purpose computers doubled every 18 months during the same two decades; the global telecommunication capacity per capita doubled every 34 months; the world's storage capacity per capita required roughly 40 months to double (every 3 years); and per capita broadcast information has doubled every 12.3 years.
Massive amounts of data are stored worldwide every day, but unless it can be analysed and presented effectively it essentially resides in what have been called data tombs: "data archives that are seldom visited". To address that issue, the field of data mining – "the process of discovering interesting patterns and knowledge from large amounts of data" – emerged in the late 1980s.

Datamangement System

Database management systems emerged in the 1960s to address the problem of storing and retrieving large amounts of data accurately and quickly. One of the earliest such systems was IBM's Information Management System (IMS), which is still widely deployed more than 40 years later.IMS stores data hierarchically, but in the 1970s Ted Codd proposed an alternative relational storage model based on set theory and predicate logic and the familiar concepts of tables, rows and columns. The first commercially available relational database management system (RDBMS) was available from Oracle in 1980.
All database management systems consist of a number of components that together allow the data they store to be accessed simultaneously by many users while maintaining its integrity. A characteristic of all databases is that the structure of the data they contain is defined and stored separately from the data itself, in a database schema.
The extensible markup language (XML) has become a popular format for data representation in recent years. Although XML data can be stored in normal file systems, it is commonly held in relational databases to take advantage of their "robust implementation verified by years of both theoretical and practical effort". As an evolution of the Standard Generalized Markup Language (SGML), XML's text-based structure offers the advantage of being both machine and human-readable.

Storage Media

Early electronic computers such as Colossus made use of punched tape, a long strip of paper on which data was represented by a series of holes, a technology now obsolete. Electronic data storage as used in modern computers dates from the Second World War, when a form of delay line memory was developed to remove the clutter from radar signals, the first practical application of which was the mercury delay line. The first random-access digital storage device was the Williams tube, based on a standard cathode ray tube, but the information stored in it and delay line memory was volatile in that it had to be continuously refreshed, and thus was lost once power was removed. The earliest form of non-volatile computer storage was the magnetic drum, invented in 1932 and used in the Ferranti Mark 1, the world's first commercially available general-purpose electronic computer.
Most digital data today is still stored magnetically on devices such as hard disk drives, or optically on media such as CD-ROMs. It has been estimated that the worldwide capacity to store information on electronic devices grew from less than 3 exabytes in 1986 to 295 exabytes in 2007, doubling roughly every 3 years.

IT IS More

Information technology (IT) is the use of computers and telecommunications equipment to store, retrieve, transmit and manipulate data. The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, such as computer hardware, software, electronics, semiconductors, internet, telecom equipment, e-commerce and computer services.
In a business context, the Information Technology Association of America has defined information technology (IT) as "the study, design, development, application, implementation, support or management of computer-based information systems". The business value of information technology is to automate business processes, provide information for decision making, connect business with their customers, and provide productivity tools to increase efficiency. In an academic context, the Association for Computing Machinery defines it as "undergraduate degree programs that prepare students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organizations .... IT specialists assume responsibility for selecting hardware and software products appropriate for an organization, integrating those products with organizational needs and infrastructure, and installing, customizing, and maintaining those applications for the organization’s computer users. Examples of these responsibilities include the installation of networks; network administration and security; the design of web pages; the development of multimedia resources; the installation of communication components; the oversight of email systems; and the planning and management of the technology lifecycle by which an organization’s technology is maintained, upgraded, and replaced."
Humans have been storing, retrieving, manipulating and communicating information since the Sumerians in Mesopotamia developed writing in about 3000 BC, but the term "Information Technology" in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Leavitt and Whisler commented that "the new technology does not yet have a single established name. We shall call it information technology (IT)." Based on the storage and processing technology employed, it is possible to distinguish four distinct phases of IT development: pre-mechanical (3000 BC – 1450 AD), mechanical (1450–1840), electromechanical (1840–1940) and electronic. This article focuses on the latter of those periods, which began in about 1940.

Wednesday 23 January 2013

IC Information

An integrated circuit or monolithic integrated circuit (also referred to as an IC, a chip, or a microchip) is a set of electronic circuits on one small plate ("chip") of semiconductor material, normally silicon. This can be made much smaller than a discrete circuit made from independent components.
Integrated circuits are used in virtually all electronic equipment today and have revolutionized the world of electronics. Computers, mobile phones, and other digital home appliances are now inextricable parts of the structure of modern societies, made possible by the low cost of producing integrated circuits.
ICs can be made very compact, having up to several billion transistors and other electronic components in an area the size of a fingernail. The width of each conducting line in a circuit (the line width) can be made smaller and smaller as the technology advances, in 2008 it dropped below 100 nanometers and in 2013 it is expected to be in the teens of nanometers.

BufferOverFlow

In computer security and programming, a buffer overflow, or
buffer overrun, is an anomaly where a program, while
writing data to a buffer, overruns the buffer's boundary and
overwrites adjacent memory. This is a special case of
violation of memory safety.
Buffer overflows can be triggered by inputs that are designed
to execute code, or alter the way the program operates. This
may result in erratic program behavior, including memory
access errors, incorrect results, a crash, or a breach of system
security. They are thus the basis of many software
vulnerabilities and can be maliciously exploited.
Programming languages commonly associated with buffer
overflows include C and C++, which provide no built-in
protection against accessing or overwriting data in any part of
memory and do not automatically check that data written to
an array (the built-in buffer type) is within the boundaries of
that array. Bounds checking can prevent buffer overflows.

Protect Your Data (Encrypt Your Files)

Medical records, tax documents and other files with personal information are often stored on personal computers. If you don't encrypt files that include personal information, you risk making yourself an easy target for cybercriminals. Encrypted folders, which are referred to as vaults, can lock down your information, so it's unavailable to anyone without your password.
Encrypt-Stick is the most advanced portable security application available on the market today. Encrypt-Stick software converts your USB flash drive into a personal vault and the key to access and secure your private files. Encrypt-Stick requires a serial numbered USB flash drive to run. It gives you the ability to create unlimited invisible encrypted vaults on an unlimited number of computers, removable hard drives or networked drives. If a vault is burned to a DVD/CD you can securely access it using the original USB used to create the vault. Encrypt-Stick provides you with the highest level of protection from identity theft, hackers, phishers and will never leave a footprint on the host computer.
With a USB drive in your pocket you can carry around personal notes, in-process documents from work, or even top secret military communications. But a hole in that pocket could quickly become a major security leak. Encrypt Stick 5.0 ($39.99 direct) equips any USB drive with a secure encrypted vault for safe data transport. It can also serve as the key for any number of local vaults on home or work PCs, and it has a secure browser and password manager built in.
Note - Once you've activated your software on a particular USB drive you can't move it to another drive. Before you install Encrypt Stick, you'll want to select a high- quality USB drive with as much storage capacity as you anticipate you'll ever need. Conveniently, you can install the Mac and Windows versions of the software on the same USB drive and access your protected files from either platform. Once you've downloaded Encrypt Stick (or using an installation CD/DVD) your ready to create an encrypted vault.
Creating An Encrypted Vault
The setup wizard walks you through the steps necessary to install and activate Encrypt Stick on your USB drive. During this process you'll create a strong master password, something that you'll remember but that nobody would guess. The password-entry box has a built-in password strength meter to help you make a good choice.
Your home system probably doesn't have a malicious keylogger running, but if you're worried you can enter that strong password using Encrypt Stick's virtual keyboard. For added security against monitoring software the virtual keyboard scrambles the location of the characters.
Encrypt Stick uses your password, along with device-specific information, to generate a unique 512-bit (polymorphic) encryption key. That means your files are protected by two-factor authentication: something you have (the USB key), and something you know (the password). Gaining access to protected data requires both.
The wizard includes a recommended optional step that makes a local backup of the decryption key. That way if you lose the USB drive containing Encrypt Stick, you can still recover encrypted files stored on your computer. Files on the lost drive itself are gone, of course, but at least nobody else will be able to read them.
Vaults for File Protection
On initialization, Encrypt Stick creates an encrypted folder right on the USB drive. When you've entered the master password, you can freely move files into and out of this folder or launch and edit the files. Outside of the Encrypt Stick interface nothing is visible except encrypted filenames and encrypted data.
You can also create any number of vaults on any PC or Mac to protect local files on that system. Encrypt Stick acts as a key to open these locked vaults. The product's main window displays available vaults in its upper portion and offers a view of the unencrypted main file system in its lower portion.
To encrypt one or more files you simply drag them onto a vault. When you copy files into a vault, Encrypt Stick offers to securely erase the originals. The help videos call this "military wipe," implying a connection with the DoD standard for overwriting files before deletion. Basically, it erases the data and writes over it 7 times for the minimum DoD standard.I It also definitely bypass' the Recycle Bin, which is sufficient to foil casual recovery of secure files.
For additional security you can set Encrypt Stick to automatically lock after a period of inactivity (10 minutes by default) and require a periodic change of the main password (every 30 days by default). This is near military grade encryption (in a commercial USB casing).
Private Browser
Encrypt Stick includes a built-in private browser. When you're browsing from a "foreign" computer your favorites, history, cached files, and all other browsing traces remain on the device. Once you unplug the device nothing remains on the host computer.
The private browser doesn't have every possible feature, but it does support tabbed browsing, and it can handle Flash and other popular content types. I was mildly annoyed to find that Ctrl+Enter in the address bar doesn't complete an address by adding "www." and ".com", but I didn't find any page that it couldn't display. I verified that no trace of surfing with the private browser remains behind on a host system.
Encrypt Stick lacks the ability to take private browsing to another level with the option to browse using a fully encrypted secure session. This is what Intel Operators use when they are connected through a compromised network in a shady Internet caf (the bad guys won't be able to sniff out private data from your network packets).
Limited Password Management
Encrypt Stick also includes a password management system linked to its private browser. You can store any number of passwords and group them in a hierarchy of categories, but you'll do all the work yourself-copying and pasting URLs from your browser and manually entering username and password data (with an option to use the virtual keyboard for passwords).
If you're setting up a new online account, you can use Encrypt Stick to generate a strong password. However, there's no provision to adjust the password generator to match a site's password policies. Key Safe's password generator lets you set the length and choose which character types to use. It even includes an option to create passwords like "purrPler0ks" that are easy to remember because you can pronounce them.
Full-powered password managers automatically capture login data as you log in to a site manually using a supported browser. I was surprised to find that Encrypt Stick doesn't offer this level of automation, given that it has total control over the browser.
Key Safe also lacks most features of full-featured password managers, but it does at least have the ability to automatically launch IE, navigate to a saved page, and fill in the login credentials. With Encrypt Stick you must click a link to open the URL in the private browser, then right-click the username and password fields individually to paste in the saved credentials. For some sites this right-click process didn't work; for others the "fill in" menu choices didn't appear.

Importance to Password

Password playing an important role in our online activities and we must give more importance to our username and password. Changing password frequently and keep it in a safe place is important to avoid unwanted hacking activities.

We must select a powerful password with the combination of characters, letters, special symbols to make our password strong. We must be very careful while giving the important password like payment process passwords, net banking password and other important ones. Change your password frequently, don't share your password with anyone even with your close friends and other members. Always keep it secret to avoid unwanted problems.

Some people will store their passwords in their browser and other keylog systems. But we must be very careful while saving password with browsers. Don't save your payment processor or net banking passwords in your browser, it may lead you to face account hacking.

Always use the secured https:// to access the important site and don't open the sites with strange links. Always go to the actual site with https link and give the password to the real site. We must be very careful with netbanking passwords and most of the banks suggest us to change the password frequently to avoid problems.

We must surely avoid using the same password with various sites, if one of our account has been hacked, the hacker will use the same password to hack other accounts, if we use the same password. So don't use the same password as well as make your password stronger by using characters, numbers,symbols with it. The combination of various characters, numbers and special codes will make your password more powerful.

Don't join with the captcha trading sites, they are using technique to hack the accounts using password. Better to keep distance from the captcha site and don't use the same password in various sites. Give a lot of importance to your password and keep it confidential, it is your safer side.

How to Backup And Restore Business Data Online?

A backup is required if you want to restore important data in case you lose the original data due to some reason such as corruption of data or data loss through deletion. All kinds of businesses are they small or large require to backup business data. As considerable data may need to be backed up, data storage space requirements are large, and a suitable backup solution should be put in place. Managing and organising the data storage space and the backup process requires considerable effort and can become very complicated. Notwithstanding all these complications, business data backup is essential.

Different Data Repository Models
Data repository models may be unstructured, where data can simply be backed up on CDs or data storing devices with hardly any attempt being made to index the information. The complication here is that it will be next to impossible to locate and retrieve any data quickly in case of a breakdown. A full only or system imaging is useful if standard configurations are to be copied, but less effective when on-going backups are required. If this is required, an incremental style of data repository should be resorted to, where the data is organised into increments of change at different periods. Other repositories include reverse delta type repositories, which makes a mirror copy of source data, and records differences between the current state of the mirror and previous states. In the case of continuous data protection, the system logs every change that is detected in the host system. Several companies have begun outsourcing online backup services, which offers them these types of services.

Types of Storage Media
Storage media that are commonly used to store data are magnetic tape, hard discs, optical storage (such as CDs, DVDs and Blue-ray discs), and solid state storage (such as USB flash drives, memory sticks, secure digital cards). All of these storage media have their own sets of advantages and disadvantages, and it is for the user to select his storage media of choice, depending on his requirements.
With the spread of broadband internet access, remote business online backup at a location far removed from the local site is possible, offering protection against disasters that may affect the whole of the local area, endangering the backups that are kept locally. However, uploading speeds and data security (as the data has to be trusted with a service provider) are weaknesses. Moreover, online backup for small businesses may be an expensive proposition for them.

Managing a Data Repository
The data repository may be managed as an online business backup, near-line, off-line (which requires direct human action), off-site or at a disaster recovery centre.

Summary :
- Organising the data storage space and the backup process requires considerable effort and can become very complicated. But the data backup process very important for small or large organisation.

How to Watch Anything and go to Any Website Without getting any viruses

This will teach you how to prevent any tracking cookies from getting in to your computer. While at the same time nothing you Search Goes into your History. This can be very helpful for one thing that most teenage boys start doing around eighth grade, if you know what I mean, wink, wink.
1
First open google chrome, if you don't have it, download it here.
2
Last step, press Ctrl+Shift+N all at the same time, and you're in safe mode. Now have fun watching those special videos ;D.

Malwares

Malware has been a problem for ages, Malware is short form of malicious software. A Malware is basically a program designed to infect a computer system without owner being informed.
Types of Malware
Malware exists in many forms, below mentioned are some of the common types of malware
1. Trojan Horse – Trojan virus or Trojan horse is one of the most common types of malware, Trojan virus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.
2. Computer Viruses – A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer
3. Worms – Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.
4. Keyloggers - A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on thecomputer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger
5. RATS – RAT is the short of “Remote Administration Tool” and is indeed one of the most dangerous types of malware. It’s very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.
6. Adware – Adware is the short form of Advertisement-supported software. Adware’s are commonly designed to display advertisements on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.