Researchers United States (U.S.) reveals an unexpected way charging the phone and virtually all other portable electrical devices. How?
Researchers University of Wisconsin-Madison (UW-Madison) described, the new energy harvester technologies that can reduce dependence on the battery dramatically. Namely, through the 'capture' the energy of human movement in order to provide power in portable electronics.
"Man is a machine producing energy is very strong," said mechanical engineering professor Tom Krupenkin UW-Madison.
As he ran like it was written UPI, humans can generate one kilowatt of power, he added.
'Catch' a fraction of this energy will be enough to give tanga on mobile electronic devices, from laptops to mobile phones, he added. Krupenkin and his colleague, J. Ashley Taylor, calling this technology 'Reverse Electrowetting'.
This technology converts mechanical energy into electrical energy using the thousands of micro-droplets of fluid that interacts with nano structured materials. 'Slippers' technology is capable of producing energy when humans walk, and could generate up to 20 watts of electricity.
Although technology can not completely replace the battery, these two scientists believe this technology has an important role to reduce pollution, and battery-related problems.
Wednesday, August 24, 2011
Advance Way to Recharge Mobile Phone Batteries
Is this the Future of Public Transportation?
Ultra-workers is one solution to the provision of public transportation is cheap and energy efficient.
Ideas about future vehicles usually shaped capsule and can move without wheels. Such was the idea to offer Ultra-PRT (Urban Light Transport, Personal Rapid Transit).
Although vehicles are highly applicable as a means of public transport, but currently its use is still top. Location was fortunate to apply Ultra is London's Heathrow Airport.
There, these vehicles are available 21 units (one unit fit six people) undergo a shuttle passengers as far as 1.2 miles from Terminal 5 to the two existing stations in the airport parking lot.
Ultra-PRTmengakui maker, manufacturing costs and operational costs of transportation projects is not costly (saving 40%), and energy efficient. Therefore, the transport system is advantageous compared to existing transportation facilities.
David Holdcraft, the project manager said in a release, the ultra-domestic transport system offers a truly new. "The service is fast, efficient, does not harm the environment, the use of any fuel-saving more than half the fuel consumption of vehicles available today," as quoted by Discovery News.
Friday, July 29, 2011
Internet Explorer users IQ are Lower?
Research by a Canadian psychometric consultant, AptiQuant, the user's browser Internet Explorer (IE) proved to have a level of intelligence (IQ) lower. Well ...?
AptiQuant offers online IQ tests free of charge to 100 thousand Internet users to then compare the average IQ scores them according to the browser used.
The test results turned out to show that IE users, both versions 6, 7, 8 or 9 has a lower IQ scores than the average user other browsers. Funny thing is, users of IE version 9 appeared to have lower IQ scores than users of IE version 8, such as alerts TG Daily, Saturday (07/30/2011).
Users of Google Chrome, Firefox and Safari claimed to have IQ scores higher than average. While users Camino, Opera and IE with Chrome Frame even has a much higher IQ.
The results of this study may be related to the ability of IE less meet current web standards so often face problems when opening a site that actually works fine in other browsers. As a result, only users with lower technical competence, who allegedly also had lower levels of intelligence, who are still willing to be patient using IE.
Though still dominating the market, IE is slowly beginning to lose its market share from the open source browser like Firefox and Chrome.
"Recent reports about the intelligence level of IE users are likely to trigger a scene," explained the AptiQuant.
"Referring to the results of this study, IT companies around the world may be starting to consider re-investing the time and they spend untul support older browsers," he concluded.
Google Maps adds features 3D buildings for some City
Google Maps as a map service and free online virtual globe provided by Google can be found at http://maps.google.com. Also Google Maps offers maps that can be converted into images such as photographs from a satellite or over the entire surface of the Earth's sky in the world.
Since the beginning of 2007 Google Maps has made the maps come alive by showing the lines on the 3D buildings when enlarged. With this feature you who have plans to walk into a place can see the building from all sides through Google Maps.
Google Maps has also released version 5.0 for Android devices and usher moving map wherever you are. Buildings can be rotated image, zoom in and switch to 3D maps on mobile devices. Now draw 3D buildings are available for some cities such as London, Paris, Barcelona, Stockholm, Singapore, Lisbon, Boulder, and 11 major cities in South Africa. But unfortunately, Jakarta is not included. We'll wait hopefully not too long.
Railways were the first Wifi in Indonesia
Passenger trains are happy to surf in cyberspace do not have to worry about its activity is inhibited when using railway transportation. Although the idea not from himself but from the Japanese nation we should be proud of PT. Kereta Api Indonesia that provides Wi-Fi service at train carriages Argo Bromo Anggrek New Image that started operation in August 2011.
Argo Bromo Anggrek Railway runs New Image of the Jakarta-Surabaya-Jakarta every day carrying 400 passengers. BerWi train ticket prices are the highest-Fi Rp. 650 thousand and there was no difference with the usual Argo Bromo Orchid.
PT. Kereta Api Indonesia (PT KAI) with PT. Axiata XL or XL is known as cellular operators to provide Wi-Fi on the train. Wi-Fi internet service is provided free of charge to passengers. In addition to providing free Internet service, PT Kereta Api also put an outlet in each car so passengers can charge the phone or their laptop. As for the station area, PT Kereta Api and XL puts a pay phone and can be used free of charge or free. Excerpted from Breaking
Wednesday, July 20, 2011
Repel mosquitoes with the phone?
Repel mosquitoes do not have a liquid or lotion insect repellent. Can also use the phone. The trick?
Mosquitoes that interferes with sleep at night it can be expelled using a smartphone application. As written Discovery, Mosquito Buster created application software developer from Japan, Sea's Garden, to repel mosquitoes.
Applications are available for Android smartphones and the iPhone can generate high frequency sound the dreaded mosquito. High frequency sound is between 17kHz to 19kHz, and will not sound the human ear.
Mosquito Buster can be used as an alternative other than a liquid repellent mosquito repellent or insect repellent lotion. In addition to not produce a strong scent, this tool is certainly environmentally friendly because it contains no chemicals.
Not only mosquito repellent, in this application there are also setting the frequency to repel rodents and even small children. The last option is suitable for parents who do not want to be disturbed children. Frequency bands can only be heard a little kid and did not sound the ears of adults.
Thursday, June 30, 2011
Peering World Class Hacker and his Fate
The hackers was divided into two groups, black hat and white hat, to signify the good or evil. The fate of hackers were diverse, some are lucky and unlucky.
Black Hat:
This group of hackers working to exploit computer systems to commit cyber crimes. Some are just curious and fun unisex basis for personal gain. Here's the famous black hat hacker and his fate.
Jonathan James, the teenager became the first teenager to prison for the actions pembajakandan sentenced to 16 years in prison at the time. "I'm just kidding. Nice to see what I can do," he said when interviewed PBS.
James always target a high profile organization. Including installing 'back door' (DRTA) in the Ministry of Defense of the United States (U.S.) for a peek sensitive emails and steal usernames and passwords of employees. The man who dubbed c0mrade who had also been breaking into NASA computers has now admitted making his own computer security company.
Adria Lamo, hackers are breaking into the New York Times and Microsoft. 'Hacker bum' is to say, "I have a laptop in Pittsburgh, and a change of clothes in DC". Kejahatannyaterutama in penetration testing to find vulnerabilities to be exploited. Yahoo!, Bank of America, Citigroup and Cingular are korbannya.Kini, he became a prominent journalist and public speaker.
Kevin Mitnick, "hacker poster 'Ministry of Justice is described as the' most wanted computer criminal in U.S. history '. The crime this man was filmed in, Freedom Downtime and Takedown. Terbesarnyaadalah crime, infiltrating Digital Equipment Corporation's computer networks and stealing software at sana.Kini, he became a computer security consultant, author and speaker.
Kevin Poulsen, 'Dark Dante'ini known to hijack the LA radio telephone network, KIIS-FM, which makes it managed to get a new Porsche. Authorities have dubbed him 'Hannibal Lecter of computer crime'. Now, he works as senior editor of Wired News. The most prominent is his article, about his identification on 744 perpetrators of sexual harassment in the MySpace profile.
Robert Tappan Morris, son of former National Security Agency scientist Robert Morris is known as the Morris Worm. The worm became the first computer worm released on the internet. The result, he became the first person charged with Fraud and Abuse Act Computer 1986.Kini, he became a professor at the MIT Computer Science and Artificial Intelligence Laboratory.
White Hat:
Hackers are usually hired by the various categories of both companies to test the integrity of the system. In this category, there are five best hacker in history. The following figure-tokohitudan fate.
Stephen Wozniak, "Woz 'known as the' other Steve Jobs' Apple. He was awarded his doctorate and the National Medal of Technology from Kettering University and Nova Southeastern University. Woz inventors also made it into the National Hall of Fame in 2000.Woz start hacking making blue boxes, bypass the phone modifier mechanisms to make free calls jauh.Kini distance, he gave instruction to students and teachers at school made, the Los Gatos School District.
Tim Barners-Lee, the hacker is famous as the creator of the World Wide Web (www), the system for access to sites, documents and Internet data. Men have a lot of awards and most famously, the Millennium Technology Prize.Pria was formerly a student at Oxford University first caught hacking with a friend.
Linus Torvalds, this man known as the father of Linux, the operating system (OS) based on Unix. Torvalds, who calls himself 'technician' is to say, modest aspirations, which wants to have fun making the best OS that he bisa.Saat this, he worked as a leader in Linux. This man had also entered '60 Years of Heroes' Majah Time.
Richard Stallman, this man famous for the GNU Project that he has made to develop a free OS. In this case, Stallman is known as the Father of Free Software. Men who choose to be called 'rms' was first done in MIT.Kini hacking, he continued to promote free software and work against Digital Rights Management through organizations like the Free Software Foundation and League for Programming Freedom.
Tsutomu Shimomura, a hacker was suddenly known by the ominous, which is attacked by Kevin Mitnick. Of the attack, Shimomura helped the FBI catch Mitnickmelalui cell phone tracking. After that, he wrote a book about the incident with journalist John Markoff who then made the movie.
Seabreacher, 'Dolphins' That Can Fly
This vehicle lived in the three realms, can be as speedboats, submarines, as well as aircraft.
Dolphin-shaped vehicle was named Innespace Seabreacher. Vehicles with five-meter is working with 1500 cc engine, which is equivalent to the power of 260 horsepower. The cockpit is waterproof so it can dive.
When functioning as a speedboat, he can go with a speed of 80 km / h on the surface of the water, and while diving in the water, its speed to 40 km / hour. In the air, he can fly to a height of 5.4 meters.
Machine used was a single jet engine, which controls movement and steering. Controls are on two foot pedals that are in the cockpit. With that control, water flow can be directed to the right or left alternately.
If control is directed downwards, then the tail will go up, and nose 'dolphin' is down and began to dive. When diving, fin back to draw air from the surface water and oxygen supply to the engine.
In the fin to the left there is a manual control to adjust the maneuver. If the fins are tilted forward, the ship will go deeper into the water.
In the cockpit there are two seats that are equipped with GPS, the iPod, and speakers, LCD screen on the front showing the view from a camera mounted on its back fin, so it serves as a digital periscopes.
Olympus Launches Three Cameras Simultaneously
Interchangeable camera Olympus introduced a new toga. One of the world's fastest autofocus enabled.
Three days ago Inilah.com announces that three new Micro Four Thirds camera from Olympus will be out June 30. So this is it. As reported by engadget, it is the third Olympus camera E-PM1 PEN, PEN E-P3, and PEN E-PL3.
All three cameras are interchangeable bersensor 12.3 megapixel Live MOS sensor, image processor TruePic VI, autofocus system, 1080i HD video mode, the new model interface, and a variety of features Art Filters. E-P3 had a look of metallic color, and he said this camera is capable of the fastest autofocus in the world. At the rear there are 614 000 pixel OLED touch screen.
While E-PL3 has 3-inch LCD, the package is sold with a pair of lenses, camera grip, and flash FL-300R. So far, the new P3 a predefined price. This camera will go on sale in August at a price of Rp 7, 7 million.
Tuesday, June 28, 2011
Wow! Grandfather Change scooter into Batmobile
London - For the grandfather is a retired construction worker, did not satisfy the standard scooter for a walk in a completely. He also became a vehicle reconstruction Batman.
Brian Vann (74) spent a week changing the scooter into the car's super hero. Batmobile grandfather is capable of driving at speed of 13 km / hour. No doubt, when these retirees bring 'mobil' it for shopping, many people gathered around.
Vann who decided to make a 'car' after his wife, Mary, died nine months ago saying, "Response to 'car' I was very surprised. People who passed by stopped and asked me take pictures."
"I feel like a celebrity, this work is like a joke, but I am happy because it can make people smile. I like making people smile." he said.
GPS Set Car Fuel Usage
Three wheeled concept car fuel efficiency. Control the use of fuel can be regulated by the GPS.
Fuel prices continue to rise makes a lot of people create fuel-efficient cars. Hybrid vehicles such as electric power or gas Chevy Volt and Toyota Prius attracted many people.
But the concept car that was introduced Cambridge Design Partnership (CDP) is not inferior to the Chevy and Toyota. Three-wheeled vehicle fuel economy can be driven 2132 miles with one gallon of fuel.
The interface is attractive. But more interesting is, test-drive conducted by Kitty Foster, the daughter of 11 years. The experiment was conducted in milage Marathon Challenge at Mallory Park, England.
This car is equipped with a GPS system called the "Go" which allows the rider can menyesuakan fuel use, so that the existing fuel can be saved.
CDP hopes this vehicle could inspire many people to be interested in engineering. CDP team has not convinced this concept car could soon be used by people on the street, but they're quite happy to create fuel-efficient vehicles.
Saturday, June 18, 2011
Scientists Discover Key Period of Human Evolution
Remains of a child than 108,000 years ago gives an insight into the key period of human evolution. Like what?
The team, led by curator Harold Dibble at the University of Pennsylvania Museum of Archaeology and Anthropology managed to find the skull and upper body of a child in Morocco, last year.
The results of this analysis of children's teeth make Dibble team can estimate the age of these children, ie 6-8 years. Dibble named this child 'Bouchra,' Arabic 'good news'. Although the name sounds feminine, this child is a boy.
In the period the child is living, modern Homo sapiens in Africa joined and began to spread to the Middle East. Meanwhile, meet the Eurasian Neanderthals.
"These findings fit the global debate on how and where and when modern humans appeared," says Dibble.
Archaeologist Curtis Marean of Arizona State University said the findings, "Combining the very small sample of hominids in Africa relics from that period. We do not know much about the human population at that time ".
Marean added, the child's age is very interesting for science. Because like the Philadelphia Inquirer wrote, "These findings represent the first boy who comes from a crucial period of time," said Marean.
Although the child's skull has not been released to the scientific community and this team has not published a paper on these findings, information regarding these findings will be broadcast on National Geographic who funded the excavation of this.
Treebot, clawed robot tree climber
With tactile sensors and visual sensors, this robot can climb up the tree upright.
Treebot is a robot designed to climb trees, so it can help people work in various jobs that need to climb trees.
Created by Lun Lam Tin and Yangsheng Xu of the Chinese University, Hong Kong, clawed robot can climb vertical tree trunks. Ability resulting from tactile sensors that can detect tilt. Starting from seeing the animal tree climber, the two scientists had to make robots capable of performing maneuvers like a real animal.
Treebot had a pair of legs each have a claw that enables the robot to climb in trees and rough textured berkemiringan perpendicular. Although it weighs only 600 grams, but he can carry loads up to 1.75 kg, or three times its own weight.
This robot is supported by a special computational algorithms, so the visual sensor and perabanya can read about the environmental conditions. But the accuracy of the information that he had captured depends on the surrounding light conditions.
Here, Sophistication Human Brain
The human brain is an organ that works very hard to be accessed and tampered, even by the owner himself.
Neuroscientist David Eagleman, says that humans have a very low level of awareness of his own brain would work. Author Incognito: The Secret Lives of the Brain added that it's good news and represents the excess of the brain organ. Because if we can consciously enter into brain function and fiddling with the system works, we may be able to stop the function or movement of certain body organs. Fortunately, our brains have 'security system' which is very high.
Humans, for example, Buddhist monks are highly trained ones, can not control his brain working. He was able to control breathing, heartbeat and blood flow. But, just like other human beings, their access to organs of the brain is very small.
Eagleman likens the sophistication of the brain as a computer security system that can not be uprooted. Like we are not able to enter the computer boot sector, because it can not break kemanannya access.
What Pictures are Most Memorable?
A study found that the human image is easier to remember than the spectacle.
"Images are not necessarily beautiful people will remember," said MIT researcher, Phillip Isola. Although visual memory is subjective, but apparently the same between individuals have a tendency to remember something.
Aude Oliva, professor of cognitive science that the human brain can remember thousands of images with excellent detail, but not all pictures will be remembered.
Researchers develop display room 10 000 images, landscapes, streets, people, etc.. Then hundreds of participants have to look at it on a computer image sequence repeatedly, and they were asked to mark on images that have never appeared, and then calculated how many images are repeated.
After investigation, it turns out on average every participant can recall similar images. "Each participant vary her memory, but on average they remember certain images," said Oliva.
The result, most people remember is the photograph that there is human image, followed by pictures of people in the room, then drawing the object at close range. Figure sight easily forgotten.
This study is useful in design science, for example to mendasain interesting book covers, or for photographers to produce images that people will remember.
Thursday, June 16, 2011
Kaspersky Held 2011 Security Analyst Summit
Kaspersky Lab, a leading provider of security software from Russia, held a Security Analyst Summit 2011 in Malaga, Spain. This annual event will discuss various topics about internet security, whether PC, mobile and cloud.
This time the event was held at the Kempinski Hotel Bahia Malaga, Spain 16 to 19 June 2011. The series main event starting on Friday (17/06/2011), detikINET also got the opportunity to attend immediately.
One of the main themes that will be a discussion of the security side of the increasingly widespread use of Cloud Computing. Eugene Kaspersky, founder of Kaspersky Labs, will discuss the topic in his keynote.
Eugene in particular will also reveal what kind of ecosystem of cyber criminals today. Primarily, he will see what the weaknesses that exist in ecosystems that could be exploited by the security forces to defeat the cyber criminals.
The main message, although the cyber criminals have many ways to target their prey, there was a chance to reach the 'happy ending' of this story.
AMD held OpenCL Coding Contest
Vendor rival Nvidia, AMD announced a competition to expand the coding contest OpenCL based applications and architecture AMD Fusion. The prize total is $ 50,000. Interested?
"We're at the turning point in the computer industry with the development of a shift in chip architecture and programming interfaces and industry standards, allowing developers to get an incredible new experience," said Manju Hedge, corporate vice president, AMD Fusion Experience Program, according to information on Thursday (06/16/2011).
He continued, coding competition is the beginning of a new wave of application development software community, because they make use of heterogeneous computing on multiple platforms.
AMD Technology Accelerated Parallel Processing (APP) (formerly ATI Stream) is a set of hardware technology and advanced software that supports OpenCL, and provide high-GPU parallel computing capabilities. AMD Fusion APU technology combines a multi-core x86 with DirectX 11-capable GPU.
In addition to the SDK, contestants will need the latest Catalyst drivers AMD which includes a runtime compiler OpenCL.
Interested? Find out more info on the following link
Monday, June 13, 2011
6 Ways counteract the virus in Mobile phones
Increasingly sophisticated mobile phones, the more susceptible it is also a communication tool has been compromised malicious programs. Here are 6 quick tips that are mixed from eHow to ward off intruders or even the invasion of viruses that operate on handheld devices.
1. Phone = PC
The phone size is not as big as the PC. But in technology, the phone just as complicated as a PC. For that, try to treat the phone like a PC. Included in the affairs of maintaining security.
The first mobile phone virus Cabir was detected in 2004. After that there is a name that is ready Brador resetting your phone, Postcard that attack Nokia phones, and others. Later, the phone Android become the main target of the virus in cell phone makers.
Malicious programs on mobile phones continues to evolve. Indeed the changes and fierce assault that occurred was not a virus on your PC. But still warrant concern.
2. Avoid Source Unknown
As in the computer, do not download any software from sources / sites is not clear or are not trusted. Sense of alert also needs to be improved in terms of application sharing with strangers. Make sure your mobile phone operating system is always up to date.
Because usually, the update of an application will be equipped with the patches on a perforated slit in the application. Well, these holes are often exploited by cyber criminals.
3. Bluetooth
Bluetooth bak 'window' opens in the system of your device. When access is opened, then the outsiders can enter with ease. For that, better turn off the Bluetooth feature, and only activate if needed.
4. Selective Synchronization
Phone type smartphone today requires synchronization of action in order to connect with other devices. Not limited to handheld devices, synchronization is usually done with desktop computers and notebooks. This activity can also apparently become the entrance to cyberbugs.
But that does not mean you are not allowed to sync. It's just that, increase your alertness.
5. Backup
If considered the data in your mobile phone is very important, it could not hurt to take a step back. Let's just say prepare for the worst.
6. Use Antivirus?
A number of antivirus companies are now beginning to look smart phone as a target market. If you want more secure, there is no harm in using one of their products. If no was no problem, provided carefully.
To be sure, when running a security application, you must be diligent, industrious do updates. Because it's useless to use antivirus software without the update. Virus definition of an antivirus application that must be updated within a certain timeframe. This is to counterbalance the emergence of a row of new viruses that are ready to attack.
Sunday, June 12, 2011
This Tool Can Reduce Waste
Namon Nassef creates ZLD to reduce waste. This tool converts waste into water vapor.
There are many ways to keep the earth from destruction. One of them is to reduce waste. Namon Nassef creates a tool that can reduce waste at sea. The device is a Zero Liquid Sewage Discharge Elimination System (ZLD).
Ships with a capacity of 3,000 people typically carry 200,000 gallons of waste water in the toilet its passenger’s one-way trip. ZLD created to reduce the amount of waste.
This tool uses engine heat to vaporize and oxidize waste toilet, bathroom, and kitchen vessels.
ZLD can be mounted anywhere on the ship. The way it works, sewage flowed into the toilet tank, and then flowed through pipes into ZLD.
Further waste into the homogenizer, the machine contains 3 pairs of dirt crusher knife. This machine works to destroy and extract dirt particles to be small.
Then injector will work with high-pressure waste heat until juices evaporate and oxidize in the form of aerosols. This process produces no odor, and finally product is carbon dioxide and water vapor clean.
Nassef create ZLD since 2004. Through the experiment 11 times, the latest version can now work only with the use of energy equivalent to 10 100-watt bulb.
In 2007 this tool to certificate approval from the U.S. Coast Guard. Not only for ships, the tool is of course also be used in airplanes and trains.
Friday, June 10, 2011
Is this the Cause of World Honey Bees Collapsing?
California - Scientists discover new virus that attacks honey bees. These instructions may help scientists understand why the honey bee colonies collapsing world.
According to the journal PLoS One, two new viruses named Lake Sinai 1 & 2 can reproduce themselves in the bee's body. In studies conducted over 10 months, the researchers also found, the virus spreads in honey bees in the summer months.
"This finding is one way of studying insect viruses and add information about the health of honey bees," said Executive Director of Project Apis Christi Heintz."It seems this virus is the cause of reduction in bee populations,” added the professor of biochemistry and biophysics Joseph DeRisi at the University of California, San Francisco's.
According to the Ministry of Agriculture United States (U.S.), honey bees needed to pollinate 130 different crops. Also, thanks to honey bees, the U.S. make a profit of more than U.S. $ 15 billion (Rp128 trillion) per year.
Since 2006, the honeybee population dropped drastically due to Colony Collapse Disorder, a mysterious syndrome killer of millions of bees.
The UN report in March said the death of honeybee colonies in the world may be due to decreased rates of plant species, air pollution, and insecticides.