Kamis, 24 Desember 2009
USB Card Reader-Shaped Eggs, Table Ready Percantik Your Work
Nice to decorate your desk with electronic devices that can enhance your small atmosphere of your space? If so, you may be quite interested if served USB multi-in-1 card reader a unique and special design follows.
Judging from the shape like an egg and with a variety of beautiful colors, you probably would not refuse if you can have this cute thing. Egg Reader is reportedly able to read various memory cards such as SD / SDHC, miniSD, MMC, MS, MS PRO Duo and M2.
Egg-shaped reader can now be run on Windows operating system and Mac also. This unique object measuring 77 × 25x25mm and weighs 45g. With a choice of black, red and white are rewarded with a price range of about 11 USD or about 110 thousand rupiah.
Minggu, 13 Desember 2009
Help robotic surgical system Surgeons operated on the man's heart still beats
Rabu, 25 November 2009
Stealth aircraft
Stealth aircraft are aircraft that use stealth technology to interfere with radar detection as well as means other than conventional aircraft by employing a combination of features to reduce visibility in the visual, audio, infrared and radio frequency (RF) spectrum. Development of stealth technology likely began in Germany during WWII. Well-known modern examples of stealth aircraft include the United States' F-117 Nighthawk (1981-2008), the B-2 Spirit "Stealth Bomber", the F-22 Raptor, and the F-35 Lightning II.While no aircraft is totally invisible to radar, stealth aircraft prevent conventional radar from detecting or tracking the aircraft effectively, reducing the odds of an attack. Stealth is accomplished by using a complex design philosophy to reduce the ability of an opponent's sensors to detect, track, or attack the stealth aircraft. This philosophy also takes into account the heat, sound, and other emissions of the aircraft as these can also be used to locate it.Stealth is the combination of passive low observable (LO) features and active emitters such as Low Probability of Intercept Radars, radios and laser designators. These are usually combined with active defenses such as Chaff, Flares, and ECMStealth aircraft are aircraft that use stealth technology to interfere with radar detection as well as means other than conventional aircraft by employing a combination of features to reduce visibility in the visual, audio, infrared and radio frequency (RF) spectrum. Development of stealth technology likely began in Germany during WWII. Well-known modern examples of stealth aircraft include the United States' F-117 Nighthawk (1981-2008), the B-2 Spirit "Stealth Bomber", the F-22 Raptor, and the F-35 Lightning II.While no aircraft is totally invisible to radar, stealth aircraft prevent conventional radar from detecting or tracking the aircraft effectively, reducing the odds of an attack. Stealth is accomplished by using a complex design philosophy to reduce the ability of an opponent's sensors to detect, track, or attack the stealth aircraft. This philosophy also takes into account the heat, sound, and other emissions of the aircraft as these can also be used to locate it.Stealth is the combination of passive low observable (LO) features and active emitters such as Low Probability of Intercept Radars, radios and laser designators. These are usually combined with active defenses such as Chaff, Flares, and ECM
Rabu, 28 Oktober 2009
Virus makers Conficker "appreciated" USD 250,000
Microsoft tried to suppress the creator of the Internet viruses that have infected Conficker millions of PCs that use Windows operating system. Based on the report, Microsoft is preparing a $ 250,000 prize to anyone who can provide referral information to arrest and punish anyone responsible for the code of this annoying program.
This software giant also said that they are also working with security researchers, providers and ICANN's domain name hoping to depose the server that has launched attacks. Worm which first appeared at the end of this year, using a very critical bug in Windows to unravel, and fortunately the bug is patched by Microsoft on October first of an estimated 12 million computers attacked by virus.
Gifts USD 250,000 may be a strong incentive to anyone who knows who is responsible for Conficker and this is not the first time Microsoft offers a similar thing. In 2003 and Microsoft never offered the same amount, as the tips to catch and punish those who are behind the SoBig and Blaster viruses. Then in 2004 Microsoft to pay USD 250,000 to the two people to identify teenagers who wrote the virus Sasser.
Are you interested in the value of USD 250,000 this? 2.9 billion is not money that little lho. Let's catch follow-up Conficker maker!
Selasa, 20 Oktober 2009
Clever Dancing Robot Ready to Entertain Your Christmas Vacation time
Apparently many ways can be done to fill those holiday than to hang out with relatives and family, but also lots of entertainment will appear in the media later.
Completing such a happy day, a group of researchers is currently preparing a new robot type plans will be exhibited on Christmas day to be exact. These robots can compete with the nimble dancers because the robot is able to dance and electronic body melenggokkan.
Curious to see this dancing robot action, please see the following video:
http://www.youtube.com/watch?v=7LnKTErIsyE