Friday, October 2, 2009

Opera 10 beta is available for Download

Earlier today, the Opera desktop team announced the availability of the Opera 10 beta which is the latest build of the Opera browser.

This new build of Opera comes packed with a lot of new features, a fresh look and feel that is much pleasing and smoother than any of the other previous looks, and enhanced speed and performance. Plus it also marks a two-digit version milestone for the Opera browser.

The biggest new feature in Opera 10 beta is Opera Turbo. a state-of-the-art compression technology introduced in Alpha, which speeds up the loading of web-pages and helps the users on dial up make the most out of their Internet connection.

Other features include:

  • An Interface-lift - Opera 10 has got a new look and feel, designed by a world-renowned designer.
  • New visual tabs - New version has a resizable tab bar, with thumbnail preview of open tabs.
  • Better Speed Dial - The most popular feature of Opera is now fully customizable.
  • Inline spell-checker - Opera might be late on this one but a fully featured spell-checker is finally here.
  • Developer tools - Dragonfly makes it easy for developers to test and debug their websites.

And many more.

Opera has always been praised for the simplicity it offers and perhaps with Opera 10, it will evolve into a full-featured mainstream web browser like Chrome, Firefox and Safari.

The first beta for Opera 10 is now available for download for all major OS platforms including Windows, Mac and Linux. Download Opera 10 beta now.

Download Safari 4 for Windows and Mac

Apple finally released the Safari 4 browser for all platforms today at the World Wide Developers Conference. The 'world's fastest browser' which had been in beta for a long time has now reached a stable milestone.

The stable version retains all the features previewed in the beta, while fixing numerous bugs.

The browser beats all the competition in the JavaScript testing conducted by Apple. Based on the Webkit engine, like Google Chrome, it gives a big competition to the likes of Firefox 3 and Internet Explorer 8. Apple however didn't use the most recent builds available for the other browsers like Firefox 3.5 beta and Google Chrome 3 alpha, which have a lot of performance improvements.

Major features of Safari 4 include ultra fast browsing, panoramic home screen with previews of favorite sites, and even Cover Flow in history along with a huge memory footprint

Download Safari 4 for Windows and Mac.

How to Enable Private Browsing mode in Firefox 3.5?

A couple of days ago Mozilla released Firefox 3.5 and the new version of this ever-favorite web browser now brings a lot a lot of new features including a Private Browsing mode.

Private Browsing mode is now a days a standard feature in all of the state-of-the-art web browsers including IE8 and Google Chrome and now with Firefox 3.5, users can surf the web or do whatever they want without leaving any traces.

Here is how to enable Private Browsing mode in Firefox:

  1. Make sure you have downloaded the latest version of Firefox 3.5
  2. Open the Tools menu and click on 'Start Private Browsing' or use [Shift + Control + P]
  3. A popup will ask you to confirm your decision so click on 'Start Private Browsing' again.
  4. Now to end the session, simply go to Tools menu and click on 'End Private Browsing'.

When Private Browsing mode in Firefox is activated, all your browsing history, cookies and data is stored temporarily and as soon as the session ends, everything is flushed so no trace is left behind.

Free 90-day License for Norton Internet Security 2009

Keeping a PC clean and free from viruses can be a hard task, not to mention how expensive it is to purchase all those security solutions and products. But Symantec here wants to help you with this by giving you the opportunity to run Norton Internet Security 2009 totally free for 90 days.

The introductory subscription is being offered for a limited-time so get hold of it while you can.Follow this page to continue. It only works for Windows XP and Vista, sadly no support for Windows 7.

Norton Internet Security 2009 gives user access to some of the most reliable security products for PC such as the Norton Antivirus, Norton Personal Firewall, Norton Antispyware and Norton Antiphishing.

To proceed with the introductory subscription, follow the link to the page provided above and click 'Download Now' and install the application. Once the installation has completed, run the application. After a 90-day period, you will be asked to purchase a license key.

Yahoo! introduces a new and more social homepage

If you were not a fan of browser start-pages like iGoogle, Yahoo! and Live, wait till you see the revamped edition of the Yahoo! homepage which now boasts more social and interactive features.

Yahoo! has been working on a new homepage since September last year and finally this new edition of the homepage is being rolled out to everyone, starting from users in the U.S.

What's special about this new homepage is that Yahoo! has removed links to all those useless Yahoo! services in the sidebar and has replaced it with a 'My Favorites' portal which lets you add your favorite social networks, blogs, websites as widgets. This will allow users to synchronize with their social activity around the web, specially social networks like Flickr, Twitter and Facebook.

Yahoo! already provides some of the basic apps/widgets for you to add in the sidebar, however a widget from any URL can be created on the fly even if it does not have RSS. For future, Yahoo! plans to allow users to sync up the homepage customizations between their desktop and mobile.

As of now, the new homepage can be only be tested by logged in users at this address.

Be the first to use Google wave, register now


Desperately waiting to 'wave' through Google wave? Here is your chance to be the member of Google wave's exclusive bugs testing team. Yes! Thats true, Google has started its hunt for users from around the globe to use, test and enjoy the wave experience.

All you need to do is to register here and you can be one of the lucky 100,000 users to use Google Wave, registration process is simple and quick. You are only required to enter your email ID. There are a couple of questions as well which you can answer if you want to but it is strongly recommended that you answer those questions.

Don't forget to write a short message for the Google wave team, it only makes your application more strong. Google has not yet explained the selection procedure but if selected you will be able to test the tool before its public launch.

Widely considered to be the email killer, Google Wave is a personal communication and collaboration tool announced by Google in this year's Google IO conference. A combination of Email, instant messaging and social networking makes Google wave a fascinating tool to use. Google wave comes with a set of very strong APIs and it is open source which means the users can make extensions to Google wave.

In initial phase the tool will be made available to the selected 100,000 users on September 30 this year while the rest of the world will be able to 'wave' a month or two later.

Twitter suffers downtime due to Denial-Of-Service

A couple of hours ago Twitter experienced the longest downtime in history which resulted in a global 'black out' for the online micro blogging website. The site went down on the Thursday morning leaving millions of Twitterers frustrated.

Initially the twitter team was not clear about the problem as it posted on the twitter status blog:

Site is down, we are determining the cause and will provide an update shortly.

Upon further investigation, it was finally declared that the server went down because of a denial-of-service attack as posted on the twitter blog:

On this otherwise happy Thursday morning, Twitter is the target of a denial of service attack.

Denial of Service attack is an attempt of paralyzing a server by increasing the work load of a server through external communication methods. This results in the consumption of the server's resources, which bars the actual users from using the 'victim' machine.

According to reports twitter is under a massive hack attack this time. Pertinent to know that twitter had been into the headlines in the past for its security loop-holes. We saw a number of twitter accounts being hacked be some hacker, leaking secret information.

The Twitter team is working on the problem as said by the Twitter blog:

We are defending against this attack now and will continue to update our status blog as we continue to defend and later investigate.

Though Twitter is back but users are experiencing unusual delays and time-outs. Highlighting the matter, the twitter status blog says:

As we recover, users will experience some longer load times and slowness. This includes timeouts to API clients. We’re working to get back to 100% as quickly as we can.

Others sites which experienced a similar DDoS attack were Facebook, LiveJournal and YouTube. The attack was generated from some parts of Russia and Germany.

Create a custom font from your own Handwriting

Now here is one useful tool for designers and graphics masters. Its called FontCapture and it lets you create a font from your own handwriting. Means you no longer need to use any complicated software to make custom fonts, this web app does it all.

The idea is simpe and easy. There's no software to download and install, all you need is a printer and a scanner. Simply fill in the font template, scan and upload it to our website, and download your completed font. Fonts created are both compatible with Windows and Mac.

To follow the easy instructions on how to create hand-made custom fonts, visit the website.

Cannot access Gmail online? Try Thunderbird

Gmail is currently facing a worldwide downtime which is affecting both users of Gmail itself and those who make use of the Mail feature in Google Apps. Google has acknowledged the issue and is still working on resolving it, though no wonder how long will it take.

For those looking for a quick solution to send/receive email through their Gmail inbox is to try theThunderbird Email Client.

According to the post on the official Gmail blog:

If you have IMAP or POP set up already, you should be able to access your mail that way in the meantime.

Since Thunderbird automatically configures to run through IMAP, so for now it is the only most recommended email client that will get you running in seconds.

Go download Thunderbird from this link. Once downloaded, select Gmail during the setup wizard, enter your password and you will be able to send/receive email through your Gmail account till the web version is restored. Tested it myself and it works!

The same method can also be used on any other occasion when Gmail is down.

Update: The GMail gadget in iGoogle.com also seems to be working, you can view your mail and compose messages from there.

ImHalal, a search engine made for Muslims





Let's say you are a Muslim and you are totally not satisfied with the search filters provided by Google and other search engines. Here comes a search engine named ImHalal that will give you the ease to search the Internet without coming across any content that might be considered as 'Haram' according to the Islamic Law.

For a test, we entered some queries such as Alcohol, Nudity etc and were impressed to see that ImHalal does exactly what it's supposed to, it blocks the query and warns the user since the results for the query may contain Haram content.

Thats not all! ImHalal even gives you a rating for the searched query if its explicit or contains any sort of Haram content. Moreover, it is able to fetch not only links, but also images and news for any particular query. The search engine uses various techniques to determine which results fetched are supposed to be 'Halal' or 'Haram'.

Now it may not be the best search engine out there but it still comes with a noble purpose. Especially, it can be of great use in Muslim households where the parents are concerned about the types of sites their children visit on the Internet.

Ready to try it our for yourself? Go Halal.

Download Nero 9 Essentials for Free

Good news for all those Nero users out there is that they can now download a free version of Nero 9 Essentials from the Nero website, thanks to AskVG.

The free version of Nero 9 Essentials comes with a little stripped down functionality but would be enough to cater for the average users. Even though now there are a couple of free alternatives available to Nero, it still remains to be best software for CD/DVD burning software and the good part is that now it can even be download for free.

For advance users, Nero 9 Essentials free also provides an option to upgrade to the full and more advanced version. Follow the link to download the software from Nero website.

Download the Yahoo! Messenger 10 Beta for Windows


Yahoo! has finally decided to launch the Yahoo! Messenger 10 IM client in beta for Windows. As claimed, this new release will add more to the features of the world's most favorite IM client for PC users.

The most noticeable new improvements have been made to the webcam feature which now allows the user to make high-quality video calls. Features include the ability to swap video windows, position the video windows side-by-side, mute the call or place it on hold.

Other new features include:

  • New "Y! Updates" view of your contact list.
  • All-new Yahoo! Insider.
  • Choose your language easily.
  • New ways to sort your contacts.
  • New icons in the IM window.

Can't wait to try out the new Yahoo! Messenger 10 beta already? Download it for Windows.

Easily manage styles for Dock on Snow Leopard

The Dock is one of the signature features in Mac OS X and for those who think it can't be customized in appearance, they need to checkout this new application called Dock Library

Dock Library is a free application that takes the headache out of managing styles for your Leopard dock. New skins amd themes can easily be applied to the Dock in Leopard and Snow Leopard makes it more visually attractive and adds more to the OS X eye-candy.

The interface of the application is simple and easy to use. All one needs to do is download a Dock style from LeopardDocks.com or LeopardDocks.net in zip format and then simply click 'Import' from within the application to add it to Dock Library.

Once a style is added to Dock Library, simply select it and click 'Activate' to see it live. Click hereto download the app, it works on both Leopard and Snow Leopard.

Facebook Lite is now available for slow connections

It has long been in news that a new and lite version of Facebook is in the works and after all this wait, Facebook has finally pushed this new version for users to try.

Facebook Lite, which can now be accessed at Lite.Facebook.com, will let users access a lightning-fast edition of the popular social networking website thus making it easier for users with slow connections to navigate the website easily.

The Lite version actually disables all sort of modules such as Highlights in the sidebar, advertising and applications which not only makes it an ideal solution for users with a slow connection, but also for those who only use Facebook for the sake of checking updates and posting comments.

Its perhaps the first attempt of Facebook in providing a Twitter-like experience to the users which is simple and to-the-point and so far, we believe that it has done a good job on it.

Change the background on Windows 7 Login screen


In the usual case mostly, Windows 7 automatically selects the background for the Login screen which can't be changed unless you hack your way into the system files, but here we have a utility that will make this task easy and simple for you.

Windows 7 Logon Background Changer is a free open source software that let you change the wallpaper of the Windows 7 Login screen. This small program is WPF based decent GPU for the 3D animations to run smoothly.

On the usage part, its pretty straightforward. Run the app, choose a folder that has the images that you want to keep as the background of your Login screen, select the image and click Apply.

It automatically creates a cropped and resized version of the image that you select which is then applied as the background of the Login screen. And the best part is that it does not mess around with the system files so it is completely safe to use.

Give it a try, download it.

Unlock iPhone 2G/3G with Firmware 3.1 on Windows



Oh we have a very good news for all those Windows users out there. You will now be able to unlock the iPhone 2G/3G right away without having to wait for the Redsnow tool.

PwnageTool 3.1 was released earlier today by the dev team but the fact that it can only be used by Mac users and leaves no ticket for Windows users seems a little unfair, so we made things a little easy for you.

We created the custom IPSW for Firmware 3.1 on iPhone 2G and iPhone 3G which lets you update without having to meddle with the baseband. This Firmware comes with the stock Apple logo and Cydia. All you have to do is download it, restore it and that's it.

For the iPhone 3G

Please use the links to download the custom IPSW of Firmware 3.1 for iPhone 3G labelediPhone1,2_3.1_7C144_Custom_Restore.

http://bit.ly/iphone3g-custom31-sizlopedia
http://bit.ly/iphone3g-custom31-sizlopedia-p2
http://bit.ly/iphone3g-custom31-sizlopedia-p3

Once downloaded, join the file parts using HJSplit and extract the ZIP archive to have one file. Now follow the steps.

  1. Please down and install iTunes 9, and then run it.
  2. Connect your iPhone to the PC.
  3. Click 'Restore' while holding SHIFT key and select the custom IPSW.
  4. Once everything is processed and OS boots up, install Ultrasnow.
  5. Follow this guide (starting from Step-3) to install Ultrasnow on iPhone.

Now you have an unlocked iPhone 3G running on Firmware 3.1.

For the iPhone 2G

Please use the links to download the custom IPSW of Firmware 3.1 for iPhone 3G labelediPhone1,1_3.1_7C144_Custom_Restore.

http://bit.ly/iphone2g-custom31-sizlopedia
http://bit.ly/iphone2g-custom31-sizlopedia-p2
http://bit.ly/iphone2g-custom31-sizlopedia-p3

Once downloaded, join the file parts using HJSplit and extract the ZIP archive to have one file. Now follow the steps.

  1. Please down and install iTunes 9, and then run it.
  2. Connect your iPhone to the PC.
  3. Click 'Restore' while holding SHIFT key and select the custom IPSW.

As no Ultrasnow is needed, so you already done with everything. Notice that no bootloader files are required.

Thats pretty much all of it. Those on Mac can make use of the custom IPSW in case they don't plan to get their hands dirty with PwnageTool which, to be honest, is not easy to go by due to lack of documentation. The Unarchiver can be used on the Mac to join the files and uncompress them.

Note: Please test and give us your feedback in the comments. Make sure not to 'Update' the Firmware at any step, only use the 'Restore' feature.

Update: Good news for iPhone 3GS users, they can now Unlock the Firmware 3.1 on their device with our exclusive tutorial.


PwnageTool for iPhone 3GS on Firmware 3.1 Released

ts Christmas everywhere for iPhone 3GS users today as the dev team has just released the new version of PwnageTool which will now allow them to update to Firmware 3.1 while preserving the old baseband, which means that users will be able to Jailbreak and even Unlock their iPhone 3GS on Firmware 3.1.

Though of course there are some limitations which might not make many iPhone 3GS users happy out there. Follow on to know more.

The new PwnageTool 3.1.3 only has support for the iPhone 3GS and even the iPod 2G, but the catch is that only users with a previously Jailbroken iPhone 3GS would be able to update their phones to Firmware 3.1 and the tool does not have support for ones with Firmware 3.1 out of the box. Likewise for the iPod 2G.

PwnageTool will only work for Mac users but we shall soon post an alternate solution for all Windows users out there. Follow the links below to download the new PwnageTool and make sure to read the release statement by the iPhone dev team.

Download PwnageTool 3.1.3 (At thePirateBay | Alternate)

A complete guide on how to Jailbreak and Unlock your iPhone 3GS on Firmware 3.1 will be available soon on this blog. Keep checking!

Unlock iPhone 3GS on Firmware 3.1 with PwnageTool


Follow the steps below to Jailbreak and then Unlock your iPhone 3GS on Firmware 3.1 without having to update the baseband. Please proceed at your own risk.

Another important note is to remember that the method only works for those who already have a previously-Jailbroken iPhone 3GS on an old firmware. Users with Out-of-the-box device shouldn't waste their time with this tutorial.

Please backup with iTunes before trying this. Here is how it goes:

  1. Grab and download the Pwnage Tool 3.1.3 for Mac OS X (At thePirateBay | Alternate)
  2. Make sure to update to the latest iTunes 9 before attempting this unlock.
  3. Download the 3.1 Firmware for iPhone 3GS and save it on your desktop.
  4. Run the Pwnage Tool 3.1.3 and select iPhone 3GS and click next.
  5. Select the Firmware 3.1 with build iPhone2,1_3.1_7C144 and click next.
  6. Select 'Yes', click next and then select 'No', now the 'Building IPSW' has started.
  7. Once completed, select 'Yes' to the prompt and click next.
  8. Open iTunes and click Restore (while holding Option key) and select the newly created Custom 3.1 IPSW on desktop.

Voila! the iPhone 3GS has now been successfully updated to 3.1 Firmware while preserving the baseband, now follow the steps on this article (starting from step-3) to unlock it with Ultrasnow.

Here is a direct link to download the iPhone 3.1 Firmware for iPhone 3G.

Note: This method will only and only work for the iPhone 3GS. Also please note that at no point are you supposed to 'Update' to a newer firmware in iTunes, only use 'Restore'. The method we used follows the Simple mode in PwnageTool 3.1.3.

Update: We have tested it and it works perfect. Windows users should expect a solution from us soon.


Monday, July 27, 2009

How to Get Relief from Technology Stress

Technology has certainly simplified our lives but it has its vices too! The saying that, “science is a good master but a bad servant” holds completely true in the case of technology. As per a new report, working women in U.K think that technology has made their lives more hectic and complicated. The constant buzzing and beeping of cell phones, music systems, and other gadgets has certainly increased the level of stress and anxiety in our lives.

We cannot escape from using technological gadgets but we can certainly find out ways for dealing with it. Here are some simple tips which can relieve you from the stress caused by technology:
All of us operate our computers on a regular basis, but how many of us actually know about the computer operations in detail? If you know more about the features of your computer, then you will be able to know how to operate it efficiently and what t do if it stops working. Many computer problems can be handled efficiently if we know more about it!
Most of us tend to ignore the error messages that appear on our computer screen. But this should not be done. Whenever you see some error message popping up on your computer screen, just research about it! Try to know what is this and why does it occur. After learning about it, you may take concrete steps to solve the problem yourself!
Is your computer hanging a lot? Is it taking more time than normal to open up an icon? Instead of getting irritated when you computer runs slow, take out time and defragment your device. Many a times, our computer runs slow because we don’t arrange files properly. Hence, you should arrange your files properly (by name or work) and delete the ones that are no longer in use. Manage all the tools efficiently so that you are able to deal with every sort of computer problem.
What about taking a break from your regular computer work? Many times, we need a break from our regular work to get reenergized or revitalized. For example, you may use the Zen art of using computers conveniently. Taking short breaks from programming, writing or something else- will certainly help you to feel more relaxed and stress-free.
Don’t overload your system. Know the limits of your Floppy disks and drivers so that you don’t overload them! Learn how to install an uninstall drivers or software’s- it will surely help you out!

Well, above are some of the ways in which you can keep yourself fee from technology stress! Have a happy and healthy life!

Air Cars

Air Cars are the newest addition to the range of cars in an attempt to prevent/reduce the exorbitant amount of pollution present in the atmosphere. Although, the air car sounds like a very new idea but it has actually been around for quite sometime now. The compressed Air car has been termed as the “zero pollution” car and is thought to be a realistic attempt to solve all the environmental problems.

The working of the air car is not very complicated and it works very easily. Basically, compressed air is used to power the vehicle and it is emitted out as cold air. Compressed air is forced into the converter pushing the pistons as a conventional petro converter would push pistons using tiny explosions. This engine is certainly going to save money for all the people and would reduce the reliance on fuels in all the countries. It is certainly a wonderful idea for a “greener and cleaner earth”.

The Air car can travel along at top speeds of 35 mph for some 60 miles on a tank of compressed air, a sufficient distance for 80% of consumers to commute to work and back and complete daily chores. This makes the car very suitable for all the environmental activists. Refilling the car will take place at adapted petrol stations for administering compressed air. In two or three minutes, and at a cost of approximately 1.5 Euros, the car will be ready to go another 200-300 kilometers.

In fact, you would be surprised to know that Zero Pollution Motors, the U.S. licensee of Luxembourg-based Motor Development International, has an air car scheduled for production in the U.S. in late 2009 or early 2010. At the speeds of 35 mph, this particular car will just use only small amounts of fuel for heating the air inside a heating chamber and thereby allowing the car to get to an estimated top speed of 96 mph.

In spite of the above features, the air car is still not ready to be used in United States, probably due to many safety reasons. But there is a report that the air car is going to be in the country by 2010. If the air car is going to make an appearance in 2010, then it will come with a price tag of $18,000. Although, the air car might just have 75 horsepower but has the ability to drive around 1000 miles before you will need to refill the air.

So, it is certainly good news for those who have been waiting for this amazing air car! I hope that all of you will enjoy sitting in the car and will have a great time riding in the air!

Biometric Systems is Useful for Authentication or not?

Biometric refers to the human specialties like finger prints, iris recognition, DNA sequence, face recognition etc. in fact the biometric is used for identification of the person. You must have heard about the authentication. The question arises that what is authentication? I must say that authentication means verification and without the verification you cannot precede further. Hence if you want to succeed in using some valuable thing which is protected by the biometric system then you will have to pass the authentication test.

The question arises that to what limit is the biometric system applicable? The answer is to a certain limit but this limit is quiet more than any other mode of authentication. Just think when your finger print is the code to open any door. Can any one other than you open it? No, certainly not. No one else will be able to open the door as it requires you’re your finger prints which is unique for every other person. However, you must have seen in some of the Hollywood movies that the villain steels the finger prints from the hero and finally is able to open the door. You can understand that how much job he had to do.

Now think of the Iris recognition. Do you know how it works? Wait I will tell you. Actually the retina of every person is unique and you can differentiate between one person and the other with the help of the retina. There are many iris recognition systems where you can register your retina and then your retina will be the password to the system. Once you are able to pass such biometric system comprising of the iris, you will be able to access the data inside it.

These biometric systems are not only used to lock the doors. They are also used to lock the computer files. On the higher level such information becomes useful and its seepage to any other person can cause the loss of billions of dollars. Hence you will definitely like to safeguard your files from the other users. For doing that you will definitely like to use the best authentication services and today the biometric systems are the best for such a high level of authentication.

Keeping all these things in mind I do feel that the biometric systems are really the best in today market. And one of the other biometric systems which are DNA has really made this system more secure than before. The DNA sequence of any person is too unique and can be used fro authentication.

I must say that the biometric systems are the best way of authenticating any security features and you should definitely use this one as it is the safest.

Wireless Electricity

Ever tried to imagine life without wires? Ever thought of having wireless electricity in your home? Well, if you have, then you are surely going to have great time. If everything goes according to the plan, then you may have electricity in your home and that too without wire! Sounds too good to be true! But, it is a reality in itself and soon you will get rid of all the wires/cables in your home.

Basically, wireless energy transfer process takes place in an electrical system where electrical energy gets transmitted from a power source to an electrical load, without the presence of interconnecting wires in an electrical grid. As you can see, there are various components needed for a wireless energy transfer. The size of the components used can be determined by using the Rayleigh Criterion or Diffraction limit used in standard RF (Radio Frequency) antenna design.

The experts in the industry believe that in near future, the power supply to your home will not depend on the electricity department but on you! I know that it sounds very unusual but it is true! You may not even be required to pay the mandatory bill amount when you are spending a vacation outside or when you are shutting off the house. It may be in the next 20 or 30 years but it is certainly going to be there!

Well nowadays, the electricity that we use is hazardous for the environment because it releases large amount of Carbon dioxide in the air. Due to the rising concern about environmental problems, it has been postulated that the electricity in future is going to be clean and green! Currently, the electricity is produced mostly by consuming fuels that are on the verge of being extinct. So, you can see that the future of wireless electricity is certainly bright and brilliant.

Apart from wireless electricity, a lot many things of daily use are going to be electrified as well. You may have electric shoes, electric combs, watches, glasses, and even electrical clothes. Now, don’t you think that its’ fantastic! And if you are still not able to believe whatever I am saying, then kindly visit he futuristic shops at Akihabara in Japan for having a glimpse of the future. It will definitely bewilder and excite you!

Well, above are some of the benefits of having wireless electricity. Although the experiments and processes are being carried out but nothing has been finalized till yet. However, the future certainly seems bright and interesting! So, think positive and hope for the best!

Wireless Electricity

Ever tried to imagine life without wires? Ever thought of having wireless electricity in your home? Well, if you have, then you are surely going to have great time. If everything goes according to the plan, then you may have electricity in your home and that too without wire! Sounds too good to be true! But, it is a reality in itself and soon you will get rid of all the wires/cables in your home.

Basically, wireless energy transfer process takes place in an electrical system where electrical energy gets transmitted from a power source to an electrical load, without the presence of interconnecting wires in an electrical grid. As you can see, there are various components needed for a wireless energy transfer. The size of the components used can be determined by using the Rayleigh Criterion or Diffraction limit used in standard RF (Radio Frequency) antenna design.

The experts in the industry believe that in near future, the power supply to your home will not depend on the electricity department but on you! I know that it sounds very unusual but it is true! You may not even be required to pay the mandatory bill amount when you are spending a vacation outside or when you are shutting off the house. It may be in the next 20 or 30 years but it is certainly going to be there!

Well nowadays, the electricity that we use is hazardous for the environment because it releases large amount of Carbon dioxide in the air. Due to the rising concern about environmental problems, it has been postulated that the electricity in future is going to be clean and green! Currently, the electricity is produced mostly by consuming fuels that are on the verge of being extinct. So, you can see that the future of wireless electricity is certainly bright and brilliant.

Apart from wireless electricity, a lot many things of daily use are going to be electrified as well. You may have electric shoes, electric combs, watches, glasses, and even electrical clothes. Now, don’t you think that its’ fantastic! And if you are still not able to believe whatever I am saying, then kindly visit he futuristic shops at Akihabara in Japan for having a glimpse of the future. It will definitely bewilder and excite you!

Well, above are some of the benefits of having wireless electricity. Although the experiments and processes are being carried out but nothing has been finalized till yet. However, the future certainly seems bright and interesting! So, think positive and hope for the best!

Tips to Choose Electrical Appliances

People are nowadays switching to electrical appliances as they provide the maximum safety and the benefit of doing fast work at homes even in the hectic schedule. These electrical are intelligent enough to automatically shut down after their work so that they can save the power. They are more energy saving as well as cost saving, portable too carry from one room to another. They completely eradicate the concept of fire so there are no chances of burnt while cooking or doing something else work.

There are various tips to consider while choosing electrical appliances.
There are traditional stores both online and offline where you can easily find the electrical appliances. You can buy the vacuum cleaners, a dishwasher, kettle, etc. thus you have a huge range of manufacturers from which to choose, but also an enormous collection of models, colors, speeds, power specifications and so on.
The best way is to go to your nearest retail center and pick up according to your choice. Another best possible way is to take the help of in-store sales person.
Buying from the stores is not as popular as it is from buying from the Internet shopping. The high street stores have the different prices and it is really less to buy from the online stores. The rates that you will find here are affordable.
There are bit problems about online stores that you have to click from one website to another, write down the information before making the choice. There is basically no one to tell you about the proper functioning, their specifications, etc.
Try to buy from the comparison site that compares and reviews a number for you. The site itself checks up on the specifications and compares what you get with what you pay, and then you can make your mind up yourself on which you want. Such comparison sites are becoming increasingly popular with online shoppers, since they can compare products sold across a wide range of online stores, and even auction sites.
Most people find it difficult to choose between one electrical appliance and another of the same type, and such websites are designed to make the choice a lot easier for you.
Try to be cautious about the plugs and safety measures before buying the electrical appliances. Make sure that you rely on the trusted sites.

Thus these are the best buying tips in order to buy the electrical appliances either from offline or online stores and know about all the specifications and their functioning.

Database Administrator: Salary Details

Database administrator is one most challenging jobs that you will find in computer field. You too must know that how important the database of any company is? You really want database to be as you have desired for. Being a computer professional one should remember that the database is the most important part of any software.

As a database administrator you are required to install, configure, troubleshoot and maintain the database system. You will be responsible for replication, backup, partitions, storage and access. You will have to monitor and optimize system performance using index tuning, disk optimization, and other method.

As far as salary is concerned it increases as your experience increases. I will provide you some details about the fact related to salary. For those who have experience less than one year, the salary is $48000 p.a. for those who have experience between one year and four year, the salary is around $55000. Those who have experience between 5 years and 9 years, the salary are about $71000. If you have experience between 10 years and 19 years the salary is around $81000 and if your experience is over 20 years, your salary will be $82000.

I must also tell you that sometimes the database professional’s charges hourly rate. However their hourly rate also varies according to their experience. It ranges from fifteen dollars per hour to 36 dollars per hour. I have seen some of the database professionals who sometimes charge around $100 per hour. The more experience you are the high rate you can charge.

As far as US is concerned the average salary of a database administrator varies from $71000 to $94000 dollars. Companies like Oracle, Accenture, people soft etc pay heavily to database administrator. I must tell you that your salary will really increase if you do a good job. I tell you that you can be in any firm but you will find one thing in common and that is the more better you will work, more you will be paid. I have seen some database professionals who are involved in database normalization and are very heavily paid. You should not be surprised if you find some data base professionals getting more than $500000 p.a.

The whole market loves those peoples who have taste to work. I must tell you that if you think professionally then you will never find the work ends. If you want more money then you have to work very hard in the beginning. You should make sure in the beginning that you have to make your name. I again emphasize that you have to make your name. Once you have made your name, then you can find yourself free and enjoy. However you have to always work hard.

The Disadvantages of Computer

Computer is one of the major inventions we have seen in our life. Initially long and tough calculations could not be solved by calculators or hands or other devices. We needed something extra powerful to perform the task of calculations and hence process the data into meaningful results. So with the invention of computers, our problems were solved and it began to be used in various business purposes, home purposes, even scientific and educational purposes. Today, computers have become a part of our life and we are so addicted to it that without it we will have to suffer a great loss in our life.

The computer technology has given us Internet which is used to access information by sitting anywhere in the world and even communicate with others. Internet facilities are the emailing, browsing websites which has helped students as well as professionals to grow their knowledge and be successful in other areas of work. But because of the evolution of internet and its widespread growth, we are seeing many disadvantages of using computer. Let us discuss some disadvantages of computer which thus makes computer and its technology harmful for everybody.

1. Harmful for teenagers
The computer is changing the mind of teenagers and college going students because of their own personal computers having internet facility. They try to browse all those porn or those forbidden sites. They have learned hacking the trusted passwords of companies and destroying all their useful information thus committing the crime. Students learn all that is apart from their studies and that is the use of weapons and other armaments and information on making dangerous bombs or alcohol and drugs. Another disadvantages of computers for teenagers are the violent computer games that they are so busy in it; and stop doing their homework, watching news and forgotten the current affairs of their country. They have become lazy enough to just sit on the internet or play games. These games have made them even shoot their hated colleagues. Even children have become obese and do no exercise to stay fit and fine. Parents should be extra attentive to know what their children are doing.

2. Harmful for companies and banks
Other disadvantages include frauds on internet banking by the various hackers who break the code and password and making the balance zero. Even online shopping is becoming perilous just because of the so called internet and the skilled hackers who have not left even hacking the credit cards or ATM cards.
Thus all the companies are losing their confidential information and word of mouth with their customers and hence for them internet is not a boon as it was previously. In terms of security, the customers are losing trust be it various credit card companies or banks providing internet facilities.

Thus we see that if computers have the advantages then disadvantages are also not far behind. So nowadays a law is made to arrest all those who commit the crime to browse the porn or prohibited sites or hacking the useful information of people.

How do fuel cells work?

Have you ever heard of the name fuel cells?
Fuel cells are basically electrochemical conversion device which means that it generates electricity by a chemical reaction. They produce electricity at the electrodes placed in the electrolyte. The electrolyte carries electrically charged elements from one electrode to the other, and a catalyst,
which speeds up the reactions.

Fuel cells are completely different from the electrochemical cell batteries as the latter store the electrical energy chemically in a closed system. But the fuel cells consume the reactant which must be refilled. As compared to the electrochemical cell batteries the electrodes in the fuel cells are catalytic and stable.

Fuel cells find their most of the use as power sources in remote locations such as remote weather stations, space crafts, massive parks, countryside locations and in military applications.

Fuel cells use hydrogen to produce electricity and even provide solutions to have a clean country as they produce electricity with very little pollution. The reason behind is that fuel cells using hydrogen and oxygen as an oxidant produce natural byproduct, water.

How does it really work let us discuss it in detail:
The basic purpose of the fuel cell is to produce electricity and direct it to outside to start a motor or illuminate the bulb. And the chemical reactions are most important for the working of the cell.
What exactly happens is; that the hydrogen atoms enter the fuel at the positive electrode and gives off its electrons. Thus the hydrogen atoms get positively charged. The electrons which are negatively charged provide the current through the wires. The oxygen enters the fuel cell at the negative electrode and combines with the hydrogen ions and electrons to convert into water. Thus the electrolyte plays an important role in passing only the proper ions to pass between anode and cathode. If proper ions are not supplied it may lead to utter disturbance and trouble resulting in no electricity.
The only thing is that as soon as the fuel is supplied with hydrogen and oxygen, electricity will be produced. In a fuel cell, chemicals always flow into the cell so it never goes lifeless. The important thing is that it becomes very difficult to make inexpensive, consistent and proficient fuel cells.
As compared to other hydro electric power plants and nuclear plants, the fuel cells are very expensive and still not efficient and reliable.
Government, private institutes and academics and business are requiring them the most.
Fuel cells produce direct current voltage which can be used in number of things such as various transports, electronic devices such as laptops, mobile phones and even in banks and hospitals, wastewater treatment, landfills etc. Thus we see how we can generate electricity with the help of a fuel cell thus making our future technology more productive and excellent.

Information about Virtualization

Let us first know what Virtualization means?
Virtualization means to run various independent systems on a single physical computer. We simply can say the conceptualization of computer resources. It is completely a technical term which means to create a virtual version of something whether it is computer, storage device, operating system and server or network resources.

The multiple virtual systems can run on different operating systems such as Windows, Red Hat and Mac OS etc. Here each virtual machine has its own hardware as CPU, hard drive, RAM so that it appears that the virtual machines are running on the individual physical system.

Why the need to virtualize? 
It is seen that the need to virtualize is nowadays becoming very important in various organizations to minimize their use of resources in order to save energy. Since we are struggling with various other means to save the energy on Earth and utilize it somewhere else, which is why the need to virtualize is very crucial.

It is a proven software technology that has rapidly changed the IT field and changing the people way of communicating. Virtualization has helped the computer professionals to save money and time and hardware resources and to be fast and productive in their work by being flexible. It also helps us in being more efficient and easily managing the work. In has helped us in lowering the expenses, increasing the security, and improving disaster recovery processes in our systems and helping us sustain our goals.

How does it work?
With the help of virtualization you can convert the hardware into software which means the virtual machine can run on its own operating system and applications just like a real computer system. Multiple virtual machines do not interfere with each other so that you all can run applications at the same time on a single computer.

We can simply run Virtualization software on any platform. What we have to do is to create virtual machines which are the collection of files located on the host system. Then we have to configure the settings on the host system, install the OS and then we are done with it. Another way is to creating master image of the virtual image which is fully configured with the OS and the necessary applications into it. Then we can easily and quickly install virtual machines by copying the master image to get the fullest server compatibility.

Types of Virtualization: 
Network virtualization is a method of uniting the available resources in a network by splitting up the acquirable bandwidth into channels, each of is independent from the others, and each can be allocated to a particular server or device in real time.
Storage virtualization is the grouping of physical storage from multiple network storage devices into a single storage device that is managed from a central system. It is frequently used in storage area networks (SANs).
Server virtualization is the disguising of server resources from server users. The purpose is to spare the user from having to manage complex details of server resources while increasing resource sharing and consumption and retaining the ability to expand later.

Thus we see how much Virtualization is important to manage our resources easily, save energy, time and money.

Computer Scanners

Imagine we need to send our mark sheets to a particular company wherever we have applied for the job and that company is asking to mail those documents. But we have the mark sheets of paper which obviously we cannot send them by mail. But all we can do is to get them scanned by a Scanner, then save it as a file on the computer and finally attach them while mailing it to the company. So we see that how useful scanners have become.

Computer scanner is a special electronic input device which is used to scan the pictures, text, various objects and converts into digital image. Initially we suffered a lot of problems when scanners were not made but technology is always at its best providing something or the other; daily fulfilling our desires and enhancing our pleasure.

One thing to keep in mind is that scanners do the same work just like our photocopy machine. The only difference we see is that photocopy machine gives out complete copy on the papers but in scanners any image gets stored in the computer’s memory in the form of a file and further can be saved on a hard disk and hence can be easily sent to other people by mail, or you can even write onto your CD or DVD or in pen drives. The scanners actually scan the picture or an object and thus convert it into digital image in the form of ASCII code which is only readable by the processor of the computer and thus gets stored in a file.

There are various kinds of scanners available such as Sheetfed Scanner in which the paper to be scanned moves but the scanning head is fixed. Flatbed Scanner is the one in which paper is placed on the flat surface but the scanning head moves to scan the image. This is a very common and affordable scanner. Another we have is the Handheld Scanner which as the name suggests taken in hand to scan the items or objects or information on the paper. It can be used for fast scanning the text or picture but it gives low quality images.

Other scanner is the Drum Scanner to produce high quality images and which is mostly used in the publishing industry. Here paper to be scanned is placed on a glass cylinder inside which there is a sensor which splits the light into 3 colors and with the help of photomultiplier tube changes the light into electrical signals.

Hence we see that scanners are important for us as they are used by people for their personal and professional life by making our life more fast, efficient, and successful and making us more technical.