YZR-M1 Fantastic
Selasa, 26 Januari 2010
di
20.00
| Diposting oleh
The Hot News
Machine Yamaha YZR-M1 is one of the best motorcycle racing in MotoGP history. Chairman of the crew Valentino Rossi, Jerry Burgess praised the performance of Fiat Yamaha motorcycles were reliable.
Yes, Ducati rider Casey Stoner is surprised to be champion in 2007. At that time, YZR-M1 with the worst achievement can only packed four victories.
However, Rossi returned to change YZR-M1 as one of the motor throughout the season undefeated in 2008 and 2009. Not surprisingly, the motor's performance won the praise of Burgess.
"YZR-M1 is a fantastic and Yamaha have done a good job. In 2007, we got the challenge from Ducati which had the support of Bridgestone tires. While Michelin could not do anything, "explained Burgess.
"We've decided to not use Michelin tires for 2008. The result, increased motor performance and speed of our Ducati match last year, "he continued quoted MCN, Wednesday (27/1/2010).
"I really like it and this is one of the machine interpreters, to make easy ride any motorcycle racer. This is the latest generation NSR, "he said.
source: http://sports.okezone.com/read/2010/01/27/38/298059/yzr-m1-fantastis
| 0 komentar |
Drink Soda So Nokia Battery..???
di
19.58
| Diposting oleh
The Hot News
BEIJING - A product designer from China Zheng Daizi thought to design a phone that a source of energy from soft drinks. For that, he created a conceptual model for Nokia phones that are powered by bio batteries.
The concept advanced by Zheng's very simple, using enzymes to produce electrical energy from carbohydrates sugar in soft drinks. In theory, this phone Zheng creation requires only sweet soda to operate.
"Based on the research I have done, I discovered that the phone battery as an energy source that is now too expensive. Not only a waste of natural resources in the manufacturing process but also potentially harmful to the environment," said Zheng was quoted as saying of Techeblog, Monday (11 / 1 / 2010).
For that, Zheng thinking to replace the traditional battery with a battery of bio to create pollution-free environment, energy-saving devices and environmentally friendly.
Bio batteries have proven they are environmentally friendly because it generates electricity from carbohydrates and sugars in carbohydrates using enzymes as catalysts.
By using bio-phone batteries, we only need one sweet soda package for mobile battery operated three to four times longer than batteries Lithium-Ion cell phone.
Unfortunately, this eco-friendly phone yet available in the market because there is a conceptual phone that is designed Zheng for Nokia. If this phone is really present, it seems we have to share a refreshment drink soda with our phones in order to remain on.
source: http://techno.okezone.com/read/2010/01/10/57/292655/57/minuman-soda-jadi-baterai-ponsel-nokia
| 0 komentar |
Have been present, Nokia X6 16GB
di
19.42
| Diposting oleh
The Hot News
Nokia renewed its X6 series by presenting a model that has a storage capacity of 16GB. Unlike his brother X6 32GB, 16GB version comes without adequate music facilities.
However, the width of the room can accommodate up to 16GB of songs 5500. The phone also has installed a 3.2-inch screen with touch screen technology enhancements, and wrapped in four different colors, namely white, black, yellow and white color, white and pink color.
Meanwhile, Nokia X6 is running on the latest operating system, Symbian ^ 1 (read: Symbian one). Other capabilities owned this phone is when Stand By for 18 days, and 11.5 hours of talktime. So that was launched Nokia Consumer, Wednesday (27/1/2010).
Other multimedia features are fixed, arrested the ability to image with 5MP resolution camera that has been coated with Carl Zeiss optics and dual LED flash. Not only that, the video recording was more fun because it can be displayed on the TV screen with high quality.
The most recent, these wireless communication devices have been paired Ovi Maps, which is provided free of charge. Issue price is still unknown, but its presence can be ascertained in this quarter.
source: http://techno.okezone.com/read/2010/01/27/57/298035/nokia-x6-16gb-hadir
| 0 komentar |
AMD Ready 'roar' with Leo
di
19.31
| Diposting oleh
The Hot News
After introducing the latest generation of chip Phenom Athlon II and II, AMD plans to showcase the latest variants of these products.
This hardware producers in roadmapnya will introduce a platform that uses a 45nm architecture, which is named Leo. Platform is intended for desktop AMD claimed running better than Intel Clarkdale that runs on 32nm.
Leo platform, the AMD is paired with a 6-core processor. This U.S. based company also hopes 'roar' Leo capable segarang previous platform, Dragon.
Nevertheless, told Engadget, Wednesday (27/1/2010), AMD platforms maintain attendance at the 32nm chip in 2011 named Scorpius.
Other products that are listed in the AMD CPU Bulldozer named Zambezi, which has the ability to 8 Core, and by AMD is the latest generation graphics solutions. As for desktop graphics solution for midrange, AMD offers Dorado platform that also will be released on the upcoming 2011.
source: http://techno.okezone.com/read/2010/01/27/324/298043/amd-siap-mengaum-dengan-leo
| 0 komentar |
Google Updates Chrome to 1500 New Features
di
19.16
| Diposting oleh
The Hot News
Google has just released the latest update to the browser Chrome. This renewal promised 1500 additional new features, and faster browser performance and safety.
Product Manager Nick Baum mentions Chrome, the browser is now becoming more stable and 400 times faster than when first released.
Site V3, Wednesday (27/1/2010) launch, the development of new tools allow users choose the applications they want to install, and helps regulate how they use it. All that is on the latest version of Chrome will be very useful if you navigate through the new features of 1500 provided.
One tool called Bookmark Sync for example, a tool that is still in beta version allows users to move bookmarks to another machine. While web developers can see some new HTML5 numbers APIs, LocalStorage including, Database API, and other WebSockets through this tool.
But for now, other than a computer with the OS (operating sytems) Chrome, the new Windows-based computer that can access the new features are. While the update to other OS-based computers will soon follow.
"Those who use Google Chrome on Linux can run on the beta channel. For Chrome on Mac users, please be patient. We are working hard so that Chrome could be present for various platforms. Bookmark Sync and other features will be coming soon in beta," tan
ndas Baum.
source: http://techno.okezone.com/read/2010/01/27/55/298070/google-update-chrome-dengan-1-500-fitur-baru
| 0 komentar |
Tips and Tricks, 6 Ways to Banish Account Hacking
di
19.03
| Diposting oleh
The Hot News
Technology used by cyber criminals are also becoming increasingly sophisticated. No doubt, the banks must have a strong security system to confronting.
Nevertheless, to avoid this crime also required the active role of the customer. Check 6 tips to keep this account piercing action according to M. Salahuddien, Vice Chairman of the Indonesia Security Incident Responses Team on Internet Infrastructure (ID-SIRTII)
1. Use only the chip card, if you have not provided bank chip card, you must ask for change and do not use for transactions before replaced. Rules of Bank Indonesia (BI) new, since January 2010 the official card and should be used only type of chip cards.
"Only, I have not confirmed whether this rule for credit cards only, or also for atm card? Should have all the cards issued by banks. If abroad, the ATM machine was not willing to accept non-chip cards," said Didin, his calling.
2. Protect the 3 digits code (CVV2) on the back of your card. Except for the authorization of transactions online, the code will never be used for conventional transactions at ATM machines, or on the counter EDC merchants. Close the 3 figures at the back of the card with stickers, whatever cellotape not transparent
3. Change your PIN as often as possible. Simple parameters, when you shave hair, change your socks (for starting the smell), or replace a toothbrush (because it was starting to wrinkle) or each time a check vehicle tire, it is time to replace your ATM card PIN. For example in a gas station, usually there is now an ATM machine, you can change your PIN when purchasing the fuel transaction.
"It's serious, the main enemy of the security problem is human behavior itself, habits, behavior, most break-ins occur because of the exploitation of social weaknesses, so-called social engineering," he said.
4. Never give information and personal data pins used for banking authorization to anyone for any reason, including the bank's customer service, such as mother's maiden name and others. Unless it believes that the procedure to go through. For now a lot of third parties (eg insurance companies) by reason of cooperation with the issuing bank, offering products in telemarketing and you are asked to give this personal information.
"Unfortunately, if it was not from telemarketing, but the syndicates fraud perpetrators, you never know and can not do cross check in this situation," continued Didin.
5. Be careful when receiving an offer from such telemarketing, because usually you have provided consent will be interpreted as a willingness to do auto ebet against your account. This is dangerous, better if less sure, you asked for more time to confirm the correct issuing bank if the bank had a partnership with the telemarketing and how the rules and risks.
"Or you might as well always reject the offer, or simply to know the name of the product and who your real organizers themselves further if interested can be a behind the initiative to contact the service provider and ask to be served. This is much safer, although you need the active participation," said Didin.
6. Keep an eye on your card presence in the counter when the merchant, do not let the card be taken anywhere and swiped into a different machine many times. You better cancel the transaction and do not have to sign anything and report to the issuing bank when the suspect with the conditions in a counter merchants.
Watch the EDC also machine condition, whether there appears an enhancement or additional cable connections are suspicious. But it needs a technical understanding, ordinary users would typically be difficult to distinguish.
We must remember, as we rub the card, then all the important information will be recorded by the EDC machine and some even in print. Such as name, card number and expiration date (sometimes the date of starting to use).
Someone does not need to have a super memory to memorize the code line number listed on the card. If you are careless enough time to use actors to record the information (thrasing). Even their cooperation with each other like two, one intentionally distract you and only carry the card or even record your card to swipe skimming machines that are not visible
sumber: http://www.detikinet.com/read/2010/01/20/152716/1282490/510/6-kiat-menghalau-pembobolan-rekening
Nevertheless, to avoid this crime also required the active role of the customer. Check 6 tips to keep this account piercing action according to M. Salahuddien, Vice Chairman of the Indonesia Security Incident Responses Team on Internet Infrastructure (ID-SIRTII)
1. Use only the chip card, if you have not provided bank chip card, you must ask for change and do not use for transactions before replaced. Rules of Bank Indonesia (BI) new, since January 2010 the official card and should be used only type of chip cards.
"Only, I have not confirmed whether this rule for credit cards only, or also for atm card? Should have all the cards issued by banks. If abroad, the ATM machine was not willing to accept non-chip cards," said Didin, his calling.
2. Protect the 3 digits code (CVV2) on the back of your card. Except for the authorization of transactions online, the code will never be used for conventional transactions at ATM machines, or on the counter EDC merchants. Close the 3 figures at the back of the card with stickers, whatever cellotape not transparent
3. Change your PIN as often as possible. Simple parameters, when you shave hair, change your socks (for starting the smell), or replace a toothbrush (because it was starting to wrinkle) or each time a check vehicle tire, it is time to replace your ATM card PIN. For example in a gas station, usually there is now an ATM machine, you can change your PIN when purchasing the fuel transaction.
"It's serious, the main enemy of the security problem is human behavior itself, habits, behavior, most break-ins occur because of the exploitation of social weaknesses, so-called social engineering," he said.
4. Never give information and personal data pins used for banking authorization to anyone for any reason, including the bank's customer service, such as mother's maiden name and others. Unless it believes that the procedure to go through. For now a lot of third parties (eg insurance companies) by reason of cooperation with the issuing bank, offering products in telemarketing and you are asked to give this personal information.
"Unfortunately, if it was not from telemarketing, but the syndicates fraud perpetrators, you never know and can not do cross check in this situation," continued Didin.
5. Be careful when receiving an offer from such telemarketing, because usually you have provided consent will be interpreted as a willingness to do auto ebet against your account. This is dangerous, better if less sure, you asked for more time to confirm the correct issuing bank if the bank had a partnership with the telemarketing and how the rules and risks.
"Or you might as well always reject the offer, or simply to know the name of the product and who your real organizers themselves further if interested can be a behind the initiative to contact the service provider and ask to be served. This is much safer, although you need the active participation," said Didin.
6. Keep an eye on your card presence in the counter when the merchant, do not let the card be taken anywhere and swiped into a different machine many times. You better cancel the transaction and do not have to sign anything and report to the issuing bank when the suspect with the conditions in a counter merchants.
Watch the EDC also machine condition, whether there appears an enhancement or additional cable connections are suspicious. But it needs a technical understanding, ordinary users would typically be difficult to distinguish.
We must remember, as we rub the card, then all the important information will be recorded by the EDC machine and some even in print. Such as name, card number and expiration date (sometimes the date of starting to use).
Someone does not need to have a super memory to memorize the code line number listed on the card. If you are careless enough time to use actors to record the information (thrasing). Even their cooperation with each other like two, one intentionally distract you and only carry the card or even record your card to swipe skimming machines that are not visible
sumber: http://www.detikinet.com/read/2010/01/20/152716/1282490/510/6-kiat-menghalau-pembobolan-rekening
| 0 komentar |
Android, BlackBerry with a Local Server
Senin, 25 Januari 2010
di
20.21
| Diposting oleh
The Hot News
Besutan BlackBerry Research in Motion (RIM) has assessed the weakness of exclusive contracts and centralized control by a Canadian company that.
Unlike the system of artificial Google Android application which has bases open devices and data centers can be placed anywhere.
"Another case with the BlackBerry, Android server will be our own governance," said Chief Marketing Officer of Indosat, Guntur Siboro
BlackBerry users in accessing the local content and international, must first trafiknya over Internet Protocol (IP) local to the gateway RIM is in Canada. Only then will return to the regional access, until finally reaching the user's hand in Indonesia.
Network flow swirling caused long delays to access the data content on the BlackBerry. Unlike with Android that uses the concept of the Open Cloud Computing data center to be managed from anywhere.
"Later, we will make Android BlackBerry with the local server," said Thunder.
Android also claimed to have the ability to not less good as the data services provided by the BlackBerry. Particularly for access to the internet data services without limits.
"That's why, Android should be no unlimited package. We calculated, per user Android requires monthly quota of 2 GB," added Guntur
| 0 komentar |
Langganan:
Postingan (Atom)