SCIENTISTS HAVE unveiled a new generation of supercomputers, including a £30m machine with the memory of 200,000 home computers and a hard disk hefty enough to hold the entire Google index of the Internet.
The huge devices, each costing tens of millions of pounds, will compete against each other this year for the title of the planet's biggest electronic brains.
The first contender, Constellation, has been built by Sun Microsystems at a cost of $59m and boasts a 1.7 petabytes hard disk. It was unveiled at the International Supercomputer conference in Dresden, Germany.
The machine - which will go live later this year - can operate at speeds of 421 teraflops, or 421 trillion calculations a second. This will outstrip IBM's 280 Teraflop Blue Gene/L, currently ranked as the world's fastest computer, by some distance. But operating at such levels will be a significant power drain, requiring the same amount of power to run as a high-speed intercity train.
Despite the immense cost, officials said that high-powered computers were now more powerful and less expensive than ever before. "We have reached unprecedented cost performance for scientific computing," said Andreas Bechtolsheim, chief archi- tect and co-founder of Sun.
The first Constellation computer, called Ranger, will be installed at the University of Texas in order to assist scientists and engineers with running incredibly complex calculations. But although Constellation will put Sun back at the top table of hitech computing along with names such as Cray and IBM, its reign as the most powerful machine on the planet is likely to be short-lived.
IBM also took the stage in Dresden to announce its forthcoming plan to build the latest Blue Gene computer, dubbed "P". It is expected to be almost three times more powerful than its predecessor.
For more details on Supercomputer visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Thursday, June 28, 2007
Wednesday, June 20, 2007
Microsoft logs on to Google complaint, to alter Vista
MICROSOFT agreed to make changes to its Windows Vista operating system in response to a complaint by Google that a feature of Vista is anticompetitive, lawyers involved in the case said.
The settlement, reached in recent days by state prosecutors, the Justice Department and Microsoft, averted the prospect of litigation over a complaint by Google that Vista had been designed to frustrate computer users who want to use software other than Microsoft's to search through files on their hard drives. Google had made its complaint confidentially as part of the consent decree proceedings set up to monitor Microsoft for any anticompetitive conduct after it settled a landmark antitrust lawsuit five years ago that had been brought by the states and the Clinton administration.
The federal government and the states were planning to file a joint status report by midnight on Tuesday in the consent decree proceedings that outlined the changes Microsoft would be making to Vista. State and federal lawyers were exchanging drafts of the report.
They said they had reached agreement on a remedy, al- though there was still some disagreement over the report's language. The disagreement reflected tensions between the Justice Department, which initially sided with Microsoft in the dispute, and some of the states, which have supported Goog1e and advocated a more aggressive stance.
Google has sought to keep a low profile in the dispute, in part because the Federal Trade Commission has recently opened a preliminary antitrust investigation into Google's proposed $3.1 billion acquisition of DoubleClick, an online advertising company.
Lawyers involved in the proceeding said the changes to Vista would allow consumers to decide which desktop search program they want to use, and that selecting software from Google or some other company would no longer slow down the computer as it does now. They said that as part of the settlement, Microsoft would let Vista users know how to change their desktop search program. But the settlement would not require Microsoft to make all the changes that Google had sought.
Google maintained that its desktop search program was slowed by an equivalent feature that is built into Vista. When the Google and Microsoft search programs run simultaneously, their indexing programs slow the operating system considerably, Google contends. As a result, Google has said that Vista violated Microsoft's 2002 antitrust settlement, which prohibits Microsoft from designing operating systems that limit the choices of consumers.
For more details on Microsoft log on to Google visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
The settlement, reached in recent days by state prosecutors, the Justice Department and Microsoft, averted the prospect of litigation over a complaint by Google that Vista had been designed to frustrate computer users who want to use software other than Microsoft's to search through files on their hard drives. Google had made its complaint confidentially as part of the consent decree proceedings set up to monitor Microsoft for any anticompetitive conduct after it settled a landmark antitrust lawsuit five years ago that had been brought by the states and the Clinton administration.
The federal government and the states were planning to file a joint status report by midnight on Tuesday in the consent decree proceedings that outlined the changes Microsoft would be making to Vista. State and federal lawyers were exchanging drafts of the report.
They said they had reached agreement on a remedy, al- though there was still some disagreement over the report's language. The disagreement reflected tensions between the Justice Department, which initially sided with Microsoft in the dispute, and some of the states, which have supported Goog1e and advocated a more aggressive stance.
Google has sought to keep a low profile in the dispute, in part because the Federal Trade Commission has recently opened a preliminary antitrust investigation into Google's proposed $3.1 billion acquisition of DoubleClick, an online advertising company.
Lawyers involved in the proceeding said the changes to Vista would allow consumers to decide which desktop search program they want to use, and that selecting software from Google or some other company would no longer slow down the computer as it does now. They said that as part of the settlement, Microsoft would let Vista users know how to change their desktop search program. But the settlement would not require Microsoft to make all the changes that Google had sought.
Google maintained that its desktop search program was slowed by an equivalent feature that is built into Vista. When the Google and Microsoft search programs run simultaneously, their indexing programs slow the operating system considerably, Google contends. As a result, Google has said that Vista violated Microsoft's 2002 antitrust settlement, which prohibits Microsoft from designing operating systems that limit the choices of consumers.
For more details on Microsoft log on to Google visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Sunday, June 17, 2007
How to Choose a Cell Phone
Cellular phones have revolutionalized the way that we communicate with each other. Instant access to people, text messaging, picture taking, and game playing are all features that have changed the way that people use the cell phone.
Whether you're in the market for your first cell phone or your ninth, it is still a good idea to look at cell phone comparisons and do as much research as possible. After using several different brands of cellular phones, people tend to prefer one manufacturer over another. However, with so many new manufacturers entering the market, it is important to keep your options open. Usually, one company will beat the rest when marketing new features.read more...
Find more about How to Choose a Cell Phone visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Whether you're in the market for your first cell phone or your ninth, it is still a good idea to look at cell phone comparisons and do as much research as possible. After using several different brands of cellular phones, people tend to prefer one manufacturer over another. However, with so many new manufacturers entering the market, it is important to keep your options open. Usually, one company will beat the rest when marketing new features.read more...
Find more about How to Choose a Cell Phone visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
A virtual PC without a PC
IN A move to make PC usage simpler and to rid maintenance-related issues for users, Switzerland-based software company Nivio, a subsidiary of iNet Global Services, has launched a Windows operating system-based on online desktop service.
With this, a user can remotely access a Windows desktop from any web browser such as Internet Explorer without having to own a PC. "It is for users who do not want to be bothered with costs, constant technology changes and upgrades - whether it is a new operating system or security patches to combat PC viruses,"
Companies like Nivio, Novatium, Wyse, Sun Microsystems and PC manufacturers like HP are eying this space with ‘thin clients' - a small box that does not contain any software or computing power and can be accessed whenever required through the Internet or on a local area network.
"The advantage is that a user can use even a 486 PC, an obsolete model that is still used in many places in India," says Duggal. He explains that this is possible because computing happens in a central server through software that they have developed unlike normal PCs where the computing happens in the sys tem that the user is working on. This he reckons could resolve the issue of slow Internet speeds, which has been one of the hindrances in uptake of ‘thin client' devices in India.
With private equity backing from investment bankers from Duetche Bank, Unicredit Group and Goldman Sachs to the tune of $6 million, the company is targeting second tier cities and the vast student population in India. According to industry observers, about 60 per cent of students in India access internet or other computer programs from cyber cafes. This does not deter Duggal who has currently signed up 2,500 users and has plans to acquire one-lakh customers by the end of 2007.
EASY COMPUTING Companies like Nivio, Novatium, Wyse, Sun Microsystems and PC manufacturers like HP are eying this space with ‘thin clients' Thin clients is a small box that does not contain any software or computing power and can be accessed.
For more details on Virtual PC visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
With this, a user can remotely access a Windows desktop from any web browser such as Internet Explorer without having to own a PC. "It is for users who do not want to be bothered with costs, constant technology changes and upgrades - whether it is a new operating system or security patches to combat PC viruses,"
Companies like Nivio, Novatium, Wyse, Sun Microsystems and PC manufacturers like HP are eying this space with ‘thin clients' - a small box that does not contain any software or computing power and can be accessed whenever required through the Internet or on a local area network.
"The advantage is that a user can use even a 486 PC, an obsolete model that is still used in many places in India," says Duggal. He explains that this is possible because computing happens in a central server through software that they have developed unlike normal PCs where the computing happens in the sys tem that the user is working on. This he reckons could resolve the issue of slow Internet speeds, which has been one of the hindrances in uptake of ‘thin client' devices in India.
With private equity backing from investment bankers from Duetche Bank, Unicredit Group and Goldman Sachs to the tune of $6 million, the company is targeting second tier cities and the vast student population in India. According to industry observers, about 60 per cent of students in India access internet or other computer programs from cyber cafes. This does not deter Duggal who has currently signed up 2,500 users and has plans to acquire one-lakh customers by the end of 2007.
EASY COMPUTING Companies like Nivio, Novatium, Wyse, Sun Microsystems and PC manufacturers like HP are eying this space with ‘thin clients' Thin clients is a small box that does not contain any software or computing power and can be accessed.
For more details on Virtual PC visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Thursday, May 17, 2007
Amazon Launch Digital Music Store
Amazon.com plans to open an online music store offering only songs that are free of copy-protection technology and can be played on anything from PCs to portable gadgets such as Apple's iPod or Microsoft's Zune.
The Internet retailer decided to steer clear of digital-rights management technology because consumers want to be able to listen to their music on any device they choose, executives said.
The market-leading iPod, for instance, can't play copy-protected music purchased from Napster or RealNetworks Inc.'s Rhapsody store. A Zune can't play tunes bought on iTunes. All players support music in the MP3 format.
Amazon's strategy "is helping to pave the way for a much better, much more customer-centric experience in digital music," said Bill Carr, Amazon's vice president of digital media.
Shares of Amazon rose $2.64, or more than 4 percent, to $63.22 Wednesday, toward the high end of the company's stock price over the past year.
Amazon's music store wasn't unexpected, and the company is tearing a page out of Apple Inc.'s songbook by offering music that's not locked down by digital-rights management technology.
Like Apple's iTunes Store, Amazon will offer DRM-free songs from Britain's EMI Music Group PLC. Amazon also said it will offer millions of tunes from 12,000 unnamed labels. Apple, however, will continue to sell copy-protected tunes.
Amazon said it would announce more labels when the service goes live later this year, but it did not identify a specific date.
Songs will be sold by the track or album, without a subscription option. Amazon didn't provide prices. Apple plans to charge $1.29 for tracks without DRM -- 30 cents more than copy-protected songs. It also said the pricier tunes would feature enhanced sound quality.
Carr said Amazon has always focused on giving customers good bargains and hinted that music will be offered at various prices. read more.....
For more details on Digital Music Store visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
The Internet retailer decided to steer clear of digital-rights management technology because consumers want to be able to listen to their music on any device they choose, executives said.
The market-leading iPod, for instance, can't play copy-protected music purchased from Napster or RealNetworks Inc.'s Rhapsody store. A Zune can't play tunes bought on iTunes. All players support music in the MP3 format.
Amazon's strategy "is helping to pave the way for a much better, much more customer-centric experience in digital music," said Bill Carr, Amazon's vice president of digital media.
Shares of Amazon rose $2.64, or more than 4 percent, to $63.22 Wednesday, toward the high end of the company's stock price over the past year.
Amazon's music store wasn't unexpected, and the company is tearing a page out of Apple Inc.'s songbook by offering music that's not locked down by digital-rights management technology.
Like Apple's iTunes Store, Amazon will offer DRM-free songs from Britain's EMI Music Group PLC. Amazon also said it will offer millions of tunes from 12,000 unnamed labels. Apple, however, will continue to sell copy-protected tunes.
Amazon said it would announce more labels when the service goes live later this year, but it did not identify a specific date.
Songs will be sold by the track or album, without a subscription option. Amazon didn't provide prices. Apple plans to charge $1.29 for tracks without DRM -- 30 cents more than copy-protected songs. It also said the pricier tunes would feature enhanced sound quality.
Carr said Amazon has always focused on giving customers good bargains and hinted that music will be offered at various prices. read more.....
For more details on Digital Music Store visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Monday, April 23, 2007
AS/400(Application System/400)
The System i (formerly known as iSeries, AS/400, and Application System/400) is a type of computer produced by IBM. It was first produced in 1988. It was then renamed to the eServer iSeries in 2000 as part of IBM's e-Server branding initiative. Now with the global move of the server and storage brands to the System brand with the Systems Agenda, the family has been renamed to System i in 2006, with the POWER5-based members of the series being called the System i5.
Features
The AS/400 is an object-based system with an integrated DB2 database that was designed to implement E. F. Codd's relational database model, which is based on Codd's 12 rules, in the operating system and hardware. read more…
Find more about AS/400 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Features
The AS/400 is an object-based system with an integrated DB2 database that was designed to implement E. F. Codd's relational database model, which is based on Codd's 12 rules, in the operating system and hardware. read more…
Find more about AS/400 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Tuesday, April 17, 2007
Computer Hacking
Hacker is a term applied often to computer software or computer hardware programmers, designers and administrators, and especially those who are perceived as experts or highly accomplished. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context .
Computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one's peers. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. read more........
For more details on Computer hacker visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one's peers. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. read more........
For more details on Computer hacker visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
The Data disaster recovery
Tap Delete key, click empty Recycle Bin, stop breathing, hit panic button... Sounds familiar? And then, have you felt that supreme feeling of futility and vacuousness well up when you learn that your hard disk has packed up? Well, despair not. And heed not the hardware engineer when he tells you all is lost. Until you have tried out these freeware remedies. They may just save your skin/sanity/soul even after a trigger-happy finger has found the delete key... Or the dark forces of digitaria have dealt death blows to your hard disk's partition tables...
Before you say your prayers and attempt data recovery, here are some points you should keep in mind: If you have deleted a file/directory inadvertently and want to get it back, avoid using your system/concerned media till you have managed to retrieve your data. The more the activity on the disk/media, the greater the chances of your deleted data being overwritten. So do not copy any files to the disk containing your lost data. Avoid Web browsing; a browser's cache files could obliterate your deleted files. Avoid launching unnecessary programmes; agam, a programme's temp file writes to the disk. In fact, delete as many more files as you can to create more free space as there are chances of overwriting lost files with new one. So empty the Recycle Bin. Clear your browser's cache. Install a recovery programme, but not on the disk where your deleted data is located. read more……..
For more details on Data Disaster visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.lookbookstores.com
Before you say your prayers and attempt data recovery, here are some points you should keep in mind: If you have deleted a file/directory inadvertently and want to get it back, avoid using your system/concerned media till you have managed to retrieve your data. The more the activity on the disk/media, the greater the chances of your deleted data being overwritten. So do not copy any files to the disk containing your lost data. Avoid Web browsing; a browser's cache files could obliterate your deleted files. Avoid launching unnecessary programmes; agam, a programme's temp file writes to the disk. In fact, delete as many more files as you can to create more free space as there are chances of overwriting lost files with new one. So empty the Recycle Bin. Clear your browser's cache. Install a recovery programme, but not on the disk where your deleted data is located. read more……..
For more details on Data Disaster visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.lookbookstores.com
Monday, April 16, 2007
Microsoft Office 2007
The 2007 Microsoft Office System (also called Microsoft Office 2007) is the most recent version of Microsoft's productivity suite. Formerly known as Office 12 in the initial stages of its beta cycle, it was released to business customers on November 30, 2006 and was made available to retail customers on January 30, 2007 which was the same day of the formal launch to retail customers of Windows Vista. Office 2007 contains a number of new features, the most notable of which is the entirely new graphical user interface called the Ribbon, replacing the menus and toolbars that have been the cornerstone of Office since its inception.
The 2007 Office system provides many of the fundamental components required to support compliance regulations, such as auditing, records management, and data security. However, some degree of development and customization is necessary to tailor regulation-compliant solutions for particular organizations and environments. This paper provides examples of extending the platform to build custom compliance solutions for the financial services, healthcare, and accounting fields. The new software will be considerably different than the current MS Office product. The look and the menu/directory views will have a new look, more like Macromedia's Dreamweaver product. read more…
Find more about Microsoft Office 2007 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The 2007 Office system provides many of the fundamental components required to support compliance regulations, such as auditing, records management, and data security. However, some degree of development and customization is necessary to tailor regulation-compliant solutions for particular organizations and environments. This paper provides examples of extending the platform to build custom compliance solutions for the financial services, healthcare, and accounting fields. The new software will be considerably different than the current MS Office product. The look and the menu/directory views will have a new look, more like Macromedia's Dreamweaver product. read more…
Find more about Microsoft Office 2007 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Saturday, April 14, 2007
About mobile phones
A mobile or cellular telephone (commonly, "cell phone") is a long-range, portable electronic device used for mobile communication. In addition to the standard voice function of a telephone, current mobile phones can support many additional services such as SMS for text messaging, email, packet switching for access to the Internet, and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception are satellite phones).
The Mobile phone is one of the most used pieces of equipment today. The concept of using hexagonal cells for mobile phone base stations was invented in 1947 by Bell Labs engineers at AT&T and was further developed by Bell Labs during the 1960s. Radiophones have a long and varied history that stretches back to the Second World War when the military started to use radio telephony links and civil services in the 1950s, with hand-held cellular radio devices being available since 1983. Due to their low establishment costs and rapid deployment, mobile phone networks have since spread rapidly throughout the world, outstripping the growth of fixed telephony. read more…..
For more details on Mobile Phones visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
The Mobile phone is one of the most used pieces of equipment today. The concept of using hexagonal cells for mobile phone base stations was invented in 1947 by Bell Labs engineers at AT&T and was further developed by Bell Labs during the 1960s. Radiophones have a long and varied history that stretches back to the Second World War when the military started to use radio telephony links and civil services in the 1950s, with hand-held cellular radio devices being available since 1983. Due to their low establishment costs and rapid deployment, mobile phone networks have since spread rapidly throughout the world, outstripping the growth of fixed telephony. read more…..
For more details on Mobile Phones visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
Friday, April 13, 2007
Guide to Buying a Webcam
A web cam in the simplest definition is a camera that is in some way connected to the World Wide Web, or Internet. As you may imagine given this broad a definition, webcams can take many different forms and flavors. Started in 1991, the first webcam was pointed at the Trojan room coffee pot in the computer science department of Cambridge University.
One of the most common types of webcams are personal cameras that are connected to a home PC, which with the help of some software allow the user to share a moving image of themselves with others. Depending on the user, and the software, this image may be publicly available to the Internet at large via a directory of some sort, or only available to the user's friends who know the proper address to connect to. These cameras are typically only on when the user's computer is turned on, and they are connected to the Internet. With the rise of DSL and Cable modems users are leaving their computers on more, which is good overall for webcam watchers, however, it has other complications including speed and security.
Webcam software typically captures the images as JPEG or MPEG files and uploads them to the Web server. There are countless Webcam sites on the Internet that have cameras pointed at virtually everything. They provide videos of people going about their daily work as well as offering the online equivalent of the live "peep show.” read more…
Find more about Guide to Buying a Webcam visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
One of the most common types of webcams are personal cameras that are connected to a home PC, which with the help of some software allow the user to share a moving image of themselves with others. Depending on the user, and the software, this image may be publicly available to the Internet at large via a directory of some sort, or only available to the user's friends who know the proper address to connect to. These cameras are typically only on when the user's computer is turned on, and they are connected to the Internet. With the rise of DSL and Cable modems users are leaving their computers on more, which is good overall for webcam watchers, however, it has other complications including speed and security.
Webcam software typically captures the images as JPEG or MPEG files and uploads them to the Web server. There are countless Webcam sites on the Internet that have cameras pointed at virtually everything. They provide videos of people going about their daily work as well as offering the online equivalent of the live "peep show.” read more…
Find more about Guide to Buying a Webcam visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Thursday, April 12, 2007
About Microsoft Corporation
Company Bio
Founded in 1975 by Bill Gates and Paul Allen, Microsoft's mission has been to create software for the personal computer that empowers and enriches people in the workplace, at school and at home. As the world's leading software provider, Microsoft strives to produce innovative products that meet customers' evolving needs.
Microsoft products include the MS-DOS and Windows operating systems for personal computers, server applications for client/server environments, business and consumer productivity applications, interactive media programs, and Internet platform and development tools. Microsoft also offers online services, sells personal computer books and input devices, and researches and develops advanced technology software products. Microsoft products, available in more than 30 languages and sold in more than 50 countries, are available for most PCs, including Intel microprocessor-based computers and Apple computers.
Annual Revenues
With annual revenues of more than $32 billion, Microsoft Corporation is more than the largest software company in the world: it is a cultural phenomenon. The company's core business is based on developing, manufacturing, and licensing software products, including operating systems, server applications, business and consumer applications, and software development tools, as well as Internet software, technologies, and services. Led by Bill Gates, the world's wealthiest individual and most famous businessman, Microsoft has succeeded in placing at least one of its products on virtually every personal computer in the world, setting industry standards and defining markets in the process. read more.......
For more details on Microsoft Corporation visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Founded in 1975 by Bill Gates and Paul Allen, Microsoft's mission has been to create software for the personal computer that empowers and enriches people in the workplace, at school and at home. As the world's leading software provider, Microsoft strives to produce innovative products that meet customers' evolving needs.
Microsoft products include the MS-DOS and Windows operating systems for personal computers, server applications for client/server environments, business and consumer productivity applications, interactive media programs, and Internet platform and development tools. Microsoft also offers online services, sells personal computer books and input devices, and researches and develops advanced technology software products. Microsoft products, available in more than 30 languages and sold in more than 50 countries, are available for most PCs, including Intel microprocessor-based computers and Apple computers.
Annual Revenues
With annual revenues of more than $32 billion, Microsoft Corporation is more than the largest software company in the world: it is a cultural phenomenon. The company's core business is based on developing, manufacturing, and licensing software products, including operating systems, server applications, business and consumer applications, and software development tools, as well as Internet software, technologies, and services. Led by Bill Gates, the world's wealthiest individual and most famous businessman, Microsoft has succeeded in placing at least one of its products on virtually every personal computer in the world, setting industry standards and defining markets in the process. read more.......
For more details on Microsoft Corporation visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Wednesday, April 11, 2007
Internet crime
Internet crime is crime committed on the Internet, using the Internet and by means of the Internet. Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyberterrorism, creation and/or distribution of viruses, spam and so on. All such crimes are computer related and facilitated crimes.
With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States and the whole world. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company. read more.....
For more details on Internet Crime visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States and the whole world. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company. read more.....
For more details on Internet Crime visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Friday, April 06, 2007
What is Atomic Clock?
An atomic clock is a type of clock that uses an atomic resonance frequency standard to feed its counter. Early atomic clocks were masers with attached equipment. Today's best atomic frequency standards (or clocks) are based on absorption spectroscopy of cold atoms in atomic fountains. National standards agencies maintain an accuracy of 10-9 seconds per day, and a precision equal to the frequency of the radio transmitter pumping the maser. The clocks maintain a continuous and stable time scale, International Atomic Time (TAI). For civil time, another time scale is disseminated, Coordinated Universal Time (UTC). UTC is derived from TAI, but synchronized with the passing of day and night based on astronomical observations.
The first atomic clock was built in 1949 at the U.S. National Bureau of Standards (NBS). The first accurate atomic clock, a cesium standard based on the transition of the cesium-133 atom, was built by Louis Essen in 1955 at the National Physical Laboratory in the UK. This led to the internationally agreed definition of the second being based on atomic time.
The best atomic clocks on Earth today are stable to about one part in 10^15," notes Kuzmich. That means an observer would have to watch the clock for 10^15 seconds or 30 million years to see it gain or lose a single second. read more.....
Find more about Atomic clock visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The first atomic clock was built in 1949 at the U.S. National Bureau of Standards (NBS). The first accurate atomic clock, a cesium standard based on the transition of the cesium-133 atom, was built by Louis Essen in 1955 at the National Physical Laboratory in the UK. This led to the internationally agreed definition of the second being based on atomic time.
The best atomic clocks on Earth today are stable to about one part in 10^15," notes Kuzmich. That means an observer would have to watch the clock for 10^15 seconds or 30 million years to see it gain or lose a single second. read more.....
Find more about Atomic clock visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The Digital devil’s dictionary
The Digital devil's Dictionary application, developed by Apple for its Macintosh computers, was introduced with Mac OS X v10.4 "Tiger".
Apple also included a Dashboard Widget for accessing the Dictionary application. In applications which support "Services", there is an option in the application menu,which brings up the Dictionary application and displays the definition of a selected word.
Malware
Software that runs computer processes that either unexpected or unauthorised but are always harmful. The term "malware"generally covers viruses, worms and Trojan horses.
Backdoor
Term for an app or service that permits remote access to an infected computer. It opens a backdoor to circumvent other security mechanisms.
Phishing
A method of stealing personal data via an authentic-looking e-mail which appears to come from a real company or institution -- to trick the recipient into sending vital banking or login information etc. read more...
Find more about Digital devil’s dictionary visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Apple also included a Dashboard Widget for accessing the Dictionary application. In applications which support "Services", there is an option in the application menu,which brings up the Dictionary application and displays the definition of a selected word.
Malware
Software that runs computer processes that either unexpected or unauthorised but are always harmful. The term "malware"generally covers viruses, worms and Trojan horses.
Backdoor
Term for an app or service that permits remote access to an infected computer. It opens a backdoor to circumvent other security mechanisms.
Phishing
A method of stealing personal data via an authentic-looking e-mail which appears to come from a real company or institution -- to trick the recipient into sending vital banking or login information etc. read more...
Find more about Digital devil’s dictionary visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Friday, March 30, 2007
iPod nano
The iPod nano is Apple's fourth digital audio player combining features of both the iPod shuffle and iPod. It was introduced on September 7, 2005, replacing the iPod mini, which was discontinued on the same day. The replacement of the mini took Apple-related websites and the press completely by surprise since, although there were rumors about a new flash memory-based iPod, there was no prior notice of the popular mini being discontinued.
Work on development of the new design of the iPod nano started only nine months before the launch date. The iPod nano has more flash memory storage than is used in the iPod shuffle and has a miniaturized version of the color screen and click wheel found on the full-sized iPods. The screen also has a higher resolution than the old grayscale iPod, allowing one more line of text than the mini's screen. The battery and other internal parts were also reduced in size. The surface of the click wheel is slightly textured, allowing greater tactile feedback for out-of-sight operation. Also, the center button on the second-generation iPod nano is slightly concave, most likely so that it would be easier to find without looking. Unlike other players in the iPod family, the iPod nano has a headphone-out situated in the bottom right of the player. read more….
Find more about iPod nano visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Work on development of the new design of the iPod nano started only nine months before the launch date. The iPod nano has more flash memory storage than is used in the iPod shuffle and has a miniaturized version of the color screen and click wheel found on the full-sized iPods. The screen also has a higher resolution than the old grayscale iPod, allowing one more line of text than the mini's screen. The battery and other internal parts were also reduced in size. The surface of the click wheel is slightly textured, allowing greater tactile feedback for out-of-sight operation. Also, the center button on the second-generation iPod nano is slightly concave, most likely so that it would be easier to find without looking. Unlike other players in the iPod family, the iPod nano has a headphone-out situated in the bottom right of the player. read more….
Find more about iPod nano visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Wednesday, March 21, 2007
Bluetooth audio
Bluetooth technology is changing the way we listen to music. Bluetooth technology allows us to wirelessly stream digital music from almost any audio player. By having wireless control of our audio devices, Bluetooth audio is becoming a necessity for all music lovers.
How would you like to stream music wirelessly from your iPod, MP3 player or computer to your home stereo system? It's all possible thanks to Bluetooth audio devices.
You can put on a pair of Bluetooth Stereo Headphones and walk around your home without the restrictions and limitations of wires. Bluetooth audio devices are also great for those of you who like to exercise and listen to music at the same time. I'm sure you're aware that jogging can be very bothersome when you're always getting tangled up in headphone wires. A Bluetooth audio device is the perfect solution.
With the new Bluetooth audio profiles, your Bluetooth audio device may even allow you to answer your mobile cell phone calls. Your music will automatically shut off to take the call and resume when the call ends. read more…..
For more details on Bluetooth audio visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
How would you like to stream music wirelessly from your iPod, MP3 player or computer to your home stereo system? It's all possible thanks to Bluetooth audio devices.
You can put on a pair of Bluetooth Stereo Headphones and walk around your home without the restrictions and limitations of wires. Bluetooth audio devices are also great for those of you who like to exercise and listen to music at the same time. I'm sure you're aware that jogging can be very bothersome when you're always getting tangled up in headphone wires. A Bluetooth audio device is the perfect solution.
With the new Bluetooth audio profiles, your Bluetooth audio device may even allow you to answer your mobile cell phone calls. Your music will automatically shut off to take the call and resume when the call ends. read more…..
For more details on Bluetooth audio visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Tuesday, March 20, 2007
Satellite television
Satellite television is television delivered by way of communications satellites, as compared to conventional terrestrial television and cable television. In many areas of the world satellite television services supplement older terrestrial signals, providing a wider range of channels and services, including subscription-only services.
Satellite Television is revolutionizing the way we enjoy entertainment. This relatively new technology is making millions of people all over our country happy all day long and all night. There are two and have thousands of people in charge of maintaining those lines and setting up new primary ways one gets entertainment programming into there home and onto their Television. The old style way is to run millions and millions of miles of cable all over the country connections. The new way is to call one of the top DIRECTV retailers, like Satellite Solutions, and tell them you want to sign up. In most cases installation and all the equipment you need are provided to you for free. read more…
Find more about Satellite television visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Satellite Television is revolutionizing the way we enjoy entertainment. This relatively new technology is making millions of people all over our country happy all day long and all night. There are two and have thousands of people in charge of maintaining those lines and setting up new primary ways one gets entertainment programming into there home and onto their Television. The old style way is to run millions and millions of miles of cable all over the country connections. The new way is to call one of the top DIRECTV retailers, like Satellite Solutions, and tell them you want to sign up. In most cases installation and all the equipment you need are provided to you for free. read more…
Find more about Satellite television visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Saturday, March 17, 2007
Radar Detector
A radar detector is an electronic device used by motorists to determine if their speed is being monitored. The term originates from early speed-detection technologies, in which police bounced a radio wave off a moving vehicle with a device called a radar gun that determined the vehicle's speed by the Doppler-effect-moderated change in the wave's frequency.
Newer speed-detection technology uses pulsed laser light (LIDAR, commonly referred to as laser detection) rather than radio waves. Modern "radar detectors" have been adapted to suit that technology, by detecting the infrared light emitted by these new detection methods. LIDAR detection is not nearly as reliable as the detection of radar, since the light is much more focused and often aimed below the windscreen level, where the detector is usually mounted.
There are many products that are advertised to claim to "scramble" or "absorb" radar; many of these scrambler devices do not work at all, and if they do work, it is by emitting an active radar scrambling pulse, which makes the device illegal to operate under in many jurisdictions. There are also LIDAR jammers that are currently legal throughout most of the US, some Canadian provinces and other countries. read more………
For more details on Radar Detector visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
Newer speed-detection technology uses pulsed laser light (LIDAR, commonly referred to as laser detection) rather than radio waves. Modern "radar detectors" have been adapted to suit that technology, by detecting the infrared light emitted by these new detection methods. LIDAR detection is not nearly as reliable as the detection of radar, since the light is much more focused and often aimed below the windscreen level, where the detector is usually mounted.
There are many products that are advertised to claim to "scramble" or "absorb" radar; many of these scrambler devices do not work at all, and if they do work, it is by emitting an active radar scrambling pulse, which makes the device illegal to operate under in many jurisdictions. There are also LIDAR jammers that are currently legal throughout most of the US, some Canadian provinces and other countries. read more………
For more details on Radar Detector visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
Tuesday, March 13, 2007
Digital Camera
A digital camera is an electronic device used to capture and store photographs electronically instead of using photographic film like conventional cameras. Modern compact digital cameras are typically multifunctional, with some devices capable of recording sound and/or video as well as photographs. Professional digital cameras are generally dedicated to photography. In the Western market, both types of digital cameras now outsell their 35 mm film counterparts. read more………
Find more about Digital Camera visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Find more about Digital Camera visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Monday, March 05, 2007
ipod
iPod is a brand of portable media players designed and marketed by Apple and launched in 2001. Devices in the iPod range are primarily digital audio players, designed around a central click wheel — although the iPod shuffle has buttons only. The line-up consists of the video-capable fifth generation iPod, the smaller iPod nano, and the display-less iPod shuffle. The full-sized model stores media on an internal hard drive, while the smaller iPod nano and iPod shuffle use flash memory. Like many digital music players, iPods can also serve as external data storage devices. In January 2007, Apple announced the iPhone, a device that combined the features of the video-capable iPod with mobile phone and mobile Internet capabilities.
Apple's iTunes software is used to transfer music to the devices. As a free jukebox application, iTunes stores an entire music library on the user's computer and can play, burn, and rip music from a CD. It can also transfer photos, videos, games and calendars to the models that support them. read more……
For more details on Ipod visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Apple's iTunes software is used to transfer music to the devices. As a free jukebox application, iTunes stores an entire music library on the user's computer and can play, burn, and rip music from a CD. It can also transfer photos, videos, games and calendars to the models that support them. read more……
For more details on Ipod visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Thursday, March 01, 2007
Windows Vista
Windows Vista is the latest release of Microsoft Windows, a line of graphical operating systems used on personal computers, including home and business desktops. Prior to its announcement on July 22, 2005, Vista was known by its codename Longhorn. On November 8, 2006, Windows Vista development was completed and released to manufacturing. Over the next two months it was released to MSDN, TechNet Plus and TechNet Direct subscribers, computer hardware and software manufacturers and volume license customers. On January 30, 2007, it was released worldwide to the general public, and is available for purchase and downloading from Microsoft's web site.
According to Microsoft, Windows Vista contains hundreds of new features; some of the most significant include an updated graphical user interface and visual style dubbed Windows Aero, improved searching features, new multimedia creation tools such as Windows DVD Maker, and completely redesigned networking, audio, print, and display sub-systems.
For more details on Windows Vista visit at www.halfvalue.com and www.halfvalue.co.uk
For more information on books at www.LookbookStores.com
According to Microsoft, Windows Vista contains hundreds of new features; some of the most significant include an updated graphical user interface and visual style dubbed Windows Aero, improved searching features, new multimedia creation tools such as Windows DVD Maker, and completely redesigned networking, audio, print, and display sub-systems.
For more details on Windows Vista visit at www.halfvalue.com and www.halfvalue.co.uk
For more information on books at www.LookbookStores.com
Thursday, January 11, 2007
Microsoft's Windows Vista
Windows Vista is the next version of Windows for clients and servers. With the client version expected in 2006 for businesses and 2007 for consumers and the server version in 2007, Vista adds numerous features, including improved security and advanced multimedia capabilities. Vista also includes Trustworthy Computing (Palladium) and greater support for digital rights management. PCs running Vista require more memory than Windows XP. At least 1GB is recommended, with 2GB being a safer bet.
Security and safety features of Windows Vista
There are a number of security and safety settings of Windows Vista. Internally, Microsoft adopted a "Security Development Lifecycle" with the underlying ethos of, "Secure by design, secure by default, secure in deployment". New code for Windows Vista was developed with the SDL methodology, and all existing code was reviewed and refactored to improve security. A number of specific improvements have been made:
• Windows Resource Protection prevents "potentially damaging system configuration changes", by preventing change to system files and settings by any process other than Windows Installer. Also changes to registry by unauthorized software are blocked.
• Protected-Mode IE: Internet Explorer runs in a separate, low-privilege process, protecting the user from malicious content and security vulnerabilities, even in ActiveX controls.
• Windows Firewall has been upgraded to support outbound packet filtering and full IPv6 support. A new MMC-based interface has been introduced which offers much more advanced control over the firewall.
• Session 0 Isolation: Previous versions of Windows ran System services in the same login session as the locally logged-in user (Session 0). In Windows Vista, Session 0 is now reserved for these services, and all interactive logins are done in other sessions. This is intended to help mitigate a class of exploits of the Windows message-passing system, known as Shatter attacks.
• BitLocker Drive Encryption. Formerly known as "Secure Startup", this software utilizes a Trusted Platform Module to improve PC security. It ensures that the PC running Windows Vista starts in a known-good state, and it also protects data from unauthorized access through full volume encryption. Data on the volume is encrypted with a Full Volume Encryption Key (FVEK), which is further encrypted with a Volume Master Key (VMK) and stored on the disk itself.
• Windows Vista can use Smart Cards or Smart Card/Password combo for user authentication.
• Windows Vista can use smart cards to store Encrypting File System (EFS) keys. This makes sure that encrypted files are accessible only as long as the smart card is physically available.
Drawbacks of Windows Vista:
• If you install Windows Vista and any other operating system on a computer, you must install Windows Vista on a separate partition. Installing Windows Vista on a separate partition ensures that it will not overwrite files used by the other operating system.
• The drawback is that Windows Vista comes with two OpenType Khmer fonts, Daunpenh and Moolboran. Those fonts have small characters, which makes it hard to view Khmer text. This problem can be fixed by installing Khmer OS fonts. After Khmer OS fonts are installed, Khmer text will display nicely on Firefox.
• Another problem would be the Keyboard layout. Khmer Keyboard layout on Windows Vista (layout attached) is not the same as Keyboard Driver from KhmerOS.info, which I think many people are used to.
Find and Use Information
The success of a business depends on the success of its people. Making your employees more productive and facilitating communication is the main reason you invest in Information Technology. Yet, with most tools today, it is difficult for employees to quickly find the information they need and leverage information technology to its full potential. Windows Vista is designed as a People-Ready solution so they can easily find and use information.
• The fast, integrated desktop search in Windows Vista helps make it easier for users to find the information they need, even if it is on a shared drive or other network resource. Windows Vista Desktop Search is integrated throughout the operating system in the start menu, control panel, and their document folders making it easy to find the information they are looking for. Users can also tag a file with "metadata" to indicate that it belongs to a certain project or other category, making it easier to search, filter and organize their files.
• Once the user has entered the search information, Windows Vista helps make it easier to identify the right data by displaying high-resolution thumbnails of the content. Users can dynamically adjust the size of these thumbnails to make them large enough for users to know whether they've found the right document without opening it. The user can then store the search results in a "search folder" to be recalled for later use.
• Windows Vista helps make users more productive managing online information as well. With tabbed browsing in Internet Explorer 7, users can visually scroll to the right page. Web page printing is also improved so you can capture all of the information, without cutting off part of the page.
For more details on Windows Vista visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit: www.lookbookstores.com
Security and safety features of Windows Vista
There are a number of security and safety settings of Windows Vista. Internally, Microsoft adopted a "Security Development Lifecycle" with the underlying ethos of, "Secure by design, secure by default, secure in deployment". New code for Windows Vista was developed with the SDL methodology, and all existing code was reviewed and refactored to improve security. A number of specific improvements have been made:
• Windows Resource Protection prevents "potentially damaging system configuration changes", by preventing change to system files and settings by any process other than Windows Installer. Also changes to registry by unauthorized software are blocked.
• Protected-Mode IE: Internet Explorer runs in a separate, low-privilege process, protecting the user from malicious content and security vulnerabilities, even in ActiveX controls.
• Windows Firewall has been upgraded to support outbound packet filtering and full IPv6 support. A new MMC-based interface has been introduced which offers much more advanced control over the firewall.
• Session 0 Isolation: Previous versions of Windows ran System services in the same login session as the locally logged-in user (Session 0). In Windows Vista, Session 0 is now reserved for these services, and all interactive logins are done in other sessions. This is intended to help mitigate a class of exploits of the Windows message-passing system, known as Shatter attacks.
• BitLocker Drive Encryption. Formerly known as "Secure Startup", this software utilizes a Trusted Platform Module to improve PC security. It ensures that the PC running Windows Vista starts in a known-good state, and it also protects data from unauthorized access through full volume encryption. Data on the volume is encrypted with a Full Volume Encryption Key (FVEK), which is further encrypted with a Volume Master Key (VMK) and stored on the disk itself.
• Windows Vista can use Smart Cards or Smart Card/Password combo for user authentication.
• Windows Vista can use smart cards to store Encrypting File System (EFS) keys. This makes sure that encrypted files are accessible only as long as the smart card is physically available.
Drawbacks of Windows Vista:
• If you install Windows Vista and any other operating system on a computer, you must install Windows Vista on a separate partition. Installing Windows Vista on a separate partition ensures that it will not overwrite files used by the other operating system.
• The drawback is that Windows Vista comes with two OpenType Khmer fonts, Daunpenh and Moolboran. Those fonts have small characters, which makes it hard to view Khmer text. This problem can be fixed by installing Khmer OS fonts. After Khmer OS fonts are installed, Khmer text will display nicely on Firefox.
• Another problem would be the Keyboard layout. Khmer Keyboard layout on Windows Vista (layout attached) is not the same as Keyboard Driver from KhmerOS.info, which I think many people are used to.
Find and Use Information
The success of a business depends on the success of its people. Making your employees more productive and facilitating communication is the main reason you invest in Information Technology. Yet, with most tools today, it is difficult for employees to quickly find the information they need and leverage information technology to its full potential. Windows Vista is designed as a People-Ready solution so they can easily find and use information.
• The fast, integrated desktop search in Windows Vista helps make it easier for users to find the information they need, even if it is on a shared drive or other network resource. Windows Vista Desktop Search is integrated throughout the operating system in the start menu, control panel, and their document folders making it easy to find the information they are looking for. Users can also tag a file with "metadata" to indicate that it belongs to a certain project or other category, making it easier to search, filter and organize their files.
• Once the user has entered the search information, Windows Vista helps make it easier to identify the right data by displaying high-resolution thumbnails of the content. Users can dynamically adjust the size of these thumbnails to make them large enough for users to know whether they've found the right document without opening it. The user can then store the search results in a "search folder" to be recalled for later use.
• Windows Vista helps make users more productive managing online information as well. With tabbed browsing in Internet Explorer 7, users can visually scroll to the right page. Web page printing is also improved so you can capture all of the information, without cutting off part of the page.
For more details on Windows Vista visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit: www.lookbookstores.com
Tuesday, January 09, 2007
Top 5 Gadgets of 2006
Nintendo DS Lite
Even as heavy metal gaming consoles like the Xbox and the PS3 begin to smother our sense and sensibilities, the sleek and diminutive Nintendo's DS Lite stands out and stands tall. With its handheld portability, WiFi-enabled gameplay, touch screen interface, a wide array of games, Game Boy Advance backward compatibility, dual screens, and in-built microphone, the NDS is surely the coolest gaming doodad ever to ensconce in your pocket. And what with an Opera web browser in the offing, you will be whistling Dixie in cyber space soon as well with this one.
Logitech Wireless DJ Music System
This amazing little thingie allows you to stream (and control) the digital music squatting in your PC to your stereo, sitting virtually anywhere your house. MP3s, WMAs, iTunes, Internet radio waves, podcasts jabber-whatever. Its "longrange remote" abilities let you browse through your PC's entire music medley on its backlit LCD screen -- even see what is playing, or lined up for the ear drums. And no, it does not require a network snaking across your home to twiddle with the play, shuffle, volume or mute buttons on this one.
Creative's Zen Vision: M
With all ears and eyeballs trained solely on the iPod, it is but natural for most of us to play possum to the Zen Vision: M. But hark this, here is a very able MP3/video playing competitor to the Apple's zing thing. Cos the 2.5 inch screens plays almost any type of video to throw at it, it makes great sound, shows excellent video, squeezes out more life than the iPod from its juice pack, plus features an FM tuner. PDA functions, voice recording, big screen entertainment with a video out connection-yeah, it does all that too.
Nokia N95
It is very tough not to be intimidated by Nokia's current flagship. A unique two-way slide form factor, 5 megapixel Carl Zeiss optic, auto-focus cam, DVD-like quality video, WLAN, 3D stereo sound, 4GB hard drive of internal storage, TV out, 60 MB of RAM, a microSD card slot for expansion. The acronyn alphabet soup support includes: HSDPA, 3.5G, 3.6Mbps download speeds, UMTS, GPRS, DGE, SIP, GPS... Obviously there is Bluetooth, infrared, USB connectivity. Total KO. No adjectives required.
Sony PlayStation 3
The ultimate next-gen gadget for hi-def gaming. It plays Blu-ray movies alongwith standard DVDs, does WiFi, figures a 60GB hard drive, has a PSP-like user-friendly interface, no external power supply, HDTV support, built-in memory card readers, is backward-compatible with PS2 and PS1 games, online play is free, Bluetooth support for wireless controllers and accessories is acomin'. At almost Rs 50,000 you may need to break quite few piggy banks to own this. But look at it as just collateral damage.
For more details on Gadgets visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit: www.lookbookstores.com
Even as heavy metal gaming consoles like the Xbox and the PS3 begin to smother our sense and sensibilities, the sleek and diminutive Nintendo's DS Lite stands out and stands tall. With its handheld portability, WiFi-enabled gameplay, touch screen interface, a wide array of games, Game Boy Advance backward compatibility, dual screens, and in-built microphone, the NDS is surely the coolest gaming doodad ever to ensconce in your pocket. And what with an Opera web browser in the offing, you will be whistling Dixie in cyber space soon as well with this one.
Logitech Wireless DJ Music System
This amazing little thingie allows you to stream (and control) the digital music squatting in your PC to your stereo, sitting virtually anywhere your house. MP3s, WMAs, iTunes, Internet radio waves, podcasts jabber-whatever. Its "longrange remote" abilities let you browse through your PC's entire music medley on its backlit LCD screen -- even see what is playing, or lined up for the ear drums. And no, it does not require a network snaking across your home to twiddle with the play, shuffle, volume or mute buttons on this one.
Creative's Zen Vision: M
With all ears and eyeballs trained solely on the iPod, it is but natural for most of us to play possum to the Zen Vision: M. But hark this, here is a very able MP3/video playing competitor to the Apple's zing thing. Cos the 2.5 inch screens plays almost any type of video to throw at it, it makes great sound, shows excellent video, squeezes out more life than the iPod from its juice pack, plus features an FM tuner. PDA functions, voice recording, big screen entertainment with a video out connection-yeah, it does all that too.
Nokia N95
It is very tough not to be intimidated by Nokia's current flagship. A unique two-way slide form factor, 5 megapixel Carl Zeiss optic, auto-focus cam, DVD-like quality video, WLAN, 3D stereo sound, 4GB hard drive of internal storage, TV out, 60 MB of RAM, a microSD card slot for expansion. The acronyn alphabet soup support includes: HSDPA, 3.5G, 3.6Mbps download speeds, UMTS, GPRS, DGE, SIP, GPS... Obviously there is Bluetooth, infrared, USB connectivity. Total KO. No adjectives required.
Sony PlayStation 3
The ultimate next-gen gadget for hi-def gaming. It plays Blu-ray movies alongwith standard DVDs, does WiFi, figures a 60GB hard drive, has a PSP-like user-friendly interface, no external power supply, HDTV support, built-in memory card readers, is backward-compatible with PS2 and PS1 games, online play is free, Bluetooth support for wireless controllers and accessories is acomin'. At almost Rs 50,000 you may need to break quite few piggy banks to own this. But look at it as just collateral damage.
For more details on Gadgets visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit: www.lookbookstores.com
Subscribe to:
Comments (Atom)