Posts

3D Video Glasses

Image
3D Video Glasses Innovative see-through display. Interact with apps, games and content in an entirely new way with Moverio’s see-through eyewear and Android-based control unit. Stay connected to your world while keeping your content private. Easily access content Moverio’s versatile Android platform, built-in wireless capability, microSDHC card slot and intuitive trackpad mean easy fingertip access to your favorite content whenever and wherever you want. Immersive, big-screen entertainment – an 80-inch perceived screen2 means large, clear images Supports 3D content – experience side-by-side 3D content like never before Portable entertainment solution – includes everything you need: Moverio glasses, Android-based control unit, 4GB microSDHC card, detachable earphones, AC adapter and protective carrying case.

Data Security

Image
Data Security Data Security is subject to several types of audit standards and verification. The most common are ISO 17799, ISO 27001-02, PCI, ITIL, SAS-70, HIPPA, SOX.  Security Administrators are responsible for creating and enforcing a policy that forms to the standards that apply to their organizations business. IT certification audits are generally carried out by 3rd party accounting firms.  They generally can be done in a week or two, depending on the size of the organization.  Clients can also carry out audits before they begin doing business with the company to ensure that their data is secured to their standards. Security Policy : A security policy is a comprehensive document that defines a companies’ methods for prevention, detection, reaction, classification, accountability of data security practices and enforcement methods.  It generally follows industry best practices as defined by ISO 17799,27001-02, PCI, ITIL, SAS-70, HIPPA , SOX or a mix

MP3 Player

Image
MP3 Player Innovative Concept Much like his Fluid Smartphone, Brazilian designer Dinard da Mata has developed another wearable gadget that becomes a fashion accessory to complement the style of next-gen users. Hailed as “MP3 Player Creative,” the portable music player features a flexible OLED screen that other than displaying the playlist also lets the user select the song or control volume with just a touch of a finger. Worn around the wrist like a bracelet, the MP3 concept gives easy access of the functions to the user. In addition, the sleek music player includes wireless headphones to offer clutter-free music on the go.

Green Computing

Image
Green Computing Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact. Green computing, Green ICT as per IFG International Federation of Green ICT and IFG Standard, green IT, or ICT sustainability, is the study and practice of environmentally sustainable computing or IT. Green IT is the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystemssuch as monitors, printers, storage devices, and networking and communications systems efficiently and effectively with minimal or no impact on the environment. History The term “ Green Computing" was probably coined shortly after the ‘ Energy Star’ program began way back in 1992. One of the first results of green computing was the “ Sleep mode” f

Robot Master

Image
Robot Master: Robot Master is a name used to refer to human-like boss robots from the original Mega Man series that possess a very advanced level of artificial intelligence. Most, if not all, Robot Masters possess a Special Weapon. These powers can be gained mainly by Mega Man, Proto Man, or Bass after the robot is defeated. Each Robot Master has a "consciousness", although the level of every "cognitive circuit" embedded inside each one of them varies, producing as many different "personality" types as found in people. Like humans, they can speak, and have emotional responses like shyness or anger. When Mega Man fights against a Robot Master, he takes great care to not damage their integrated circuit chip's "cognitive circuit". As long as the cognitive circuit isn't completely destroyed, they can be rebuilt any number of times. Robot Master is a special kind of robot or android that possesses a very advanced level

Computer virus

Image
Computer virus:  A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. A computer virus is a program or piece of code designed to damage your computer by corrupting system files, wasting resources, destroying data or otherwise being a nuisance. Viruses are unique from other forms of malware in that they are self-replicating capable of copying themselves across files or other computers without a user's consent. History of computer viruses: The first computer virus to be discovered in the wild was "Elk Cloner," which infected Apple II operating systems through floppy disks and displayed a humorous message on infected computers. Elk Cloner, which was developed by 15-year-old Richard Skrenta in 1982, was designed as a prank

Backup

Image
Backup:  An additional copy of data or information stored on secondary storage media is called the back up data.  In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup  The common media for backup are zip disks, magnetic tape, floppy disk, CD-ROM and hard disk etc. Types of backup: Full backup: Back up all data on the hard disk is called complete backup or full backup. The advantage of this back up is that the entire hard disk is backed up. The data can be restored from this backup case of a problem in system. Incremental backups:   Incremental backup create a copy of only the data that is newly create or modified since the last backup. This process is preformat automatically in some software. In this type of backup the entire disk is not copy. It takes less time and space then