Dollar Ziddu

Translate

Kurs Mata Uang

Sabtu, 07 April 2012

Microsoft Introduces 11 Kinect-Based Startups


Microsoft probably had no idea its Kinect motion-based gaming device could be hacked and utilized for various situations beyond video gaming. The company launched the Kinect Accelerator program back in November in a mission to help these cottage hackers take their Kinect development even further. The chosen startups will work closely with mentors from Microsoft Research, Microsoft Studios, Kinect for Windows, and the Xbox team as they provide support and knowledge.
The Kinect Accelerator program received almost 500 applicants, winnowing the selection to 50 before finally settling to 11 groups–one more than their original plan of taking 10 groups under their wing. These groups hail from across the globe and will receive $20,000 and office space, as well as Kinect hardware and development software to turn their ideas into reality.
Microsoft did not reveal what exactly each team is working on, only hinting that their Kinect-based programs would benefit the medical, retail, fashion, and even farm industries. The specifics of their startups would be revealed once the mentorship program concludes.

source : gadget.com
Source: Engadget 

ION Air Pro POV


People are getting more and more acquainted with portable action cameras, especially the sporty types. It allows them to record action video of their exploits from their own point of view of the action. While there can be a limited number wearable action cameras available, it is by any means a growing market that has attracted other makers into the fold. One of those who will be in this mix is ION as it introduces its new ION Air Pro POV Camera.
The new ION Air Pro POV Action Camera is an action camera that allows users to shoot HD video while also sharing it with friends online in real time. It is one of the very first smartphone compatible action cameras in the market. It is both compatible with iOS and Android devices. It can be attached conveniently on a bike mount or in any type of helmet via its CamLOCK System. It also comes with a rechargeable battery that’s good for up to 7 hours of recording time. WiFi capability allows this camera to wirelessly connect with a smartphone and share what it sees to people online in real time. Consider it as a portable HD Action Webcam that you can connect to your smartphone. The ION Air Pro PIV camera is now available in the market and will go for around 229 UK Pounds or US$365 for only the camera. The full WiFi version of the camera will cost around 299 UK Pounds or US$475 when it comes out next month.

source : gadget.com
Image Source: ION

Epicurious iPad App


Getting that urge to cook something can happen anytime. But what to cook at a certain time and with what’s available is always a challenge for some people. For those who would wish to have this resolved can always have this Epicurious iPad app handy.
The Epicurious iPad app is a very useful tool to have around the kitchen or pretty much anywhere else where food and cooking is concerned. First and foremost, it provides iPad users with the access to around 30,000 professionally created and tested recipes, all presented in a convenient cookbook layout. It also provides users with other handy tools such as what cooking options they have with what stuff is currently available in their fridge. Users can simply type in the ingredients that they currently have and the Epicurious app will provide a number of possible recipes that they can conjure up for the day’s menu. If there is something missing, the app can make up a shopping list for them the next time they head out to the supermarket.
The Epicurious app also provides users with nutritional information for the different recipes in store. That is why it may also be a handy app for the health conscious set that always looks out for what they eat or cook. Users can also save and share their favorite recipes via their preferred social networks.

source : gadget.com

Instapaper Pro iPad App


Apple iPad users usually have a convenient means to go and browse over the Web wherever they are. They may find many interesting articles and content to read about. But sometimes they may not have the time to read them all at just one sitting. In cases where people may have a lot of interesting online articles to read but do not have the time right now to read them all, there’s the Instapaper Pro iPad app that might be quite the helpful tool.
The Instapaper Pro is a handy iPad app that allows users to mark and save the many interesting articles they have browsed over the Web for later reading. Instapaper downloads them into the device, making them available for reading even when offline. The app also presents the articles in text optimized view to make them easy to read by iPad users. Text fonts and sizes can also be adjusted.
The Instapaper Pro app also provides a Dark Mode for people with the habit of reading in the dark. The app also has a built-in dictionary, making it easy for people to look up certain terms that they are not really sure what it means. Able to download up to 500 articles at a time, the Instapaper iPad app makes it easier for people to catch up on their reading whenever they have the time. This useful iPad app is available at Apple App Store for a $4.99 download.

source : gadget.com
Image Source: App Store

When Apple and Google Asked to Help Police


KOMPAS.com - Police United States tried to embrace Apple and Google to support digital forensics to uncover a CASE law. As the owner of the most popular mobile Operating Systems now husband, two sons of the deferred taxes are required in order to open the ACCESS related ongoing police who wish to be examined.
Smartphone, a prayer One device frequently checked the police to present additional facts. However, when the defendant locked his smartphone ACCESS, would not want the police to work the same Google Search Article child tax liabilities Operating System owners.
When accessing the Request for smartphone has been approved by a judge, usually the child tax liabilities NUSANTARA MEDIA has no choice but to obey.
Law enforcement is a language From the San Francisco Bay Area, said at least Apple has 3 support the police in recent years. HOW, Apple remove the iPhone screen mohammad The code for the retrieval of Investigation confiscated. THERE IS mohammad code is usually 4 digits.
As for the access to an Android device, the only way is to ask Articles Google Search Google Gmail password reset user name and users. Then, the username and password has been reset ITU handed over to police.
However, Google is known to be very strict confidentiality and security of the owner's Gmail account. Need extra negotiations to convince Google to reset the user account.
From the Sacramento Sheriff language, Mutations April 2012 Husband filed a joint training Google Search for New Articles Apple And Google, in order to assist the process of making law enforcement the article open the Google Search Unbeknownst pemilikya ACCESS smartphone.
What do the initials AS policing is effective in dismantling the crime. Now the gadget Much like a wallet or diary, the store conversations, photos, videos and activities of a person traveling.
Predict the site CNet Technology, Will the Rajin police mobile devices accessing the tripping CASE orangutan.

Source :


source : tekno.kompas.com

Jumat, 06 April 2012

10 Wish "Online"





KOMPAS.com - A study conducted by Forrester reported that in the moments before the holidays, consumers who shop online increased.
Are pleased not only selling web sites, but also the "digital robber" As more and more transactions, the greater the chance they get what they want.
How to avoid the interference of the criminals? Here are 10 guidelines for trading safely online:
A. Do research on the web site where you shopThese tips should be done if you like clothes shopping online at your own web site that is less familiar. Check the seller's phone number and contact.
If not convinced, go to Google or Yahoo search engine and enter the name of that website. Look for reviews from their customers. If anything goes wrong, please, just leave the website.
2. Read the policy carefully to the web sites of your personal dataDo not get any points in the policy which states that the web site manager may give personal data to other parties.
Also read the returns policy. Because the items purchased can not be seen physically, there must be guarantees that the goods are shipped defective, you may send the defective items back and of course be replaced with a new item or your money back.
Also check who pays the return item.
3. Check the package of goods by reading the product description carefully.Curigailah on branded goods are sold at huge discounts.
4. Do not be easily tempted bargain huntersDo not rush to fall in love with the offer of goods at low prices that come from e-mail, let alone ask for ID and password without permission from the owner of the e-mail. That usually work spammer.
But be careful, spammers can also seduce. He sent an e-mail that seems to come from a good company. Instead, visit the company web site carefully, and direct spending darisana. Do not via e-mail or pop-up window.
5. Find a sign that the website was secureThe sign is usually a padlock in the status bar (status bar) browser. Before submitting any personal information, check out the sign was there.
When you are prompted to enter registration information credit card numbers, see the web site address. Web site address should change from http to "shttp 'or' https'. This means that payment information is encrypted, better be safe anyway.
6. Secure Your PCYour PC must have a minimum of antivirus. Better yet, if you have anti-spyware and firewall. Remember, security software must be updated regularly so that your PC is protected from the latest threats. Good, just set the automatic update process.
7. Consider ways of paymentPayment is usually made by credit card. With a credit card, you have strong evidence that you've done a transaction if the goods are not delivered or not to order.
But, because of the theft of a credit card number, payment by using a system such as PayPal, Transfer Send, or COD may be considered.
8. Check the total price.Prices of goods, plus the cost of a pack, plus postage, hopefully there is the discount.Compare the total price of a web site with another web site.
9. Keep proof of the transactionIncludes product description and price, digital receipts, and also a copy of the e-mail between you and the seller.
10. Turn off your PC after the transactionIf the PC is turned on, could have been there robber who had planted malware, took over control of the PC and perform transactions.


source : tekno.kompas.com

Kamis, 05 April 2012

Caution, Pitfalls Free Gifts on Twitter and Facebook





Jakarta - The next time you receive an offer for free on the internet iPad, beware. As the old saying goes, if something sounds impossible, it may very well be.
Internet and computer security firm Symantec reported, scammers in droves visited social networking sites like Twitter and Facebook to launch the action.
As is known, Twitter and Facebook itself is flooded with various brands because they know the use of social networking to their marketing campaigns.
Well, beyond that scammers are also good at taking advantage of opportunities. They sought to benefit financially from the victim. The tactic is commonly used, such as Symantec reported on Thursday (04/05/2012) is as follows.
A. Provide a direct link to the affiliate site
A few days before and after the announcement of the new third-generation iPad for example, users who ngetweet about the new tablet is likely to receive replies from scammers who directed Twitter offers a free iPad.
Many of these links actually redirect to the affiliate page that asked personal information such as email address and shipping information.
A number of scammers also started to send video to the YouTube user guide that guides the user step-by-step process to get their free iPad or iPhone.
The scammer then uses the description of the video to redirect to the affiliate page and then trick users into providing personal information.
2. Creating a fake user account promotion
This one mode, the user is redirected to a fake Twitter account in a particular brand. If you receive a reply from an unknown Twitter account that promises something for free, protect yourself and other users to report the account to Twitter.
Symantec advises users to be cautious when clicking on the URL without finding out first using a preview or a plug-in. Users are also required to be wary if asked to provide personal information. First, make sure that requests for information is legitimate.


source : inet.detik.com