World's Smallest flash

Do you have a flash? How much capacity? 128 Mb, 256 Mb, 1 Gb, or even more? Howbig in size? A sum of matches, or for an eraser?





Now there is the world's smallest flash. Its size is no larger than your fingertips.Thickness of less than 4 mm. Its capacity can reach 8 to 16 Gb.

When measured by the number of files, the flash is capable of storing eight movies(probably DVD format), songs that might be playedover 10 days ,8000 fruit photos witha resolution of 5 megafixel . So small, so the flash needs to be given a chain, that are not easily lost.

Details

1. The smallest physical size with large capacity ever made
2. 8-16 Gb capacity.
3. Waterproof
4. Velocity up to 200x, 30 Mb / sec
5.Kompatibel with Windows Operating System, Mac and Linux





iPad 2


Are you a fan of gadgets? Prepare to welcome the latest gadget made ​​by Apple. Yes,this is iPad2.Gadget is equipped with a faster processor, thin design and there are 2pieces of the camera.
IPAD is the best gadget of 2010. Until late last year, Apple managed to sell 15 millionunits iPad. It's beyond previous predictions. While this year's estimated sales of the entire tablet computers reached 50 million units.

There is a rumor that this iPad2 will be available starting March 11 in the U.S. and 25March in the UK and Europe, iPad2 runs on dual-core processor chip new A5, whichclaimed Apple will provide twice the speed of CPU performance, but can reach ninetimes the graphics performance of the original iPad. On the camera there are featuresthat support Apple FaceTime, namely video calling application, and a gyroscope likethe iPhone 4.

This IPad2 Design-third thinner than the old model, which is only 8.8mm, and is also lighter at 1.3 pounds. However, it is claimed to have the same battery life at around 10jam.Seperti owned by generations of previous IPAD, IPAD 2 comes with Wi-Fi or Wi-Fiand 3G versions, each available with a memory capacity of 16GB, 32GB or 64GB.However, the price remains the same as for first generation iPad

Steve Jobs said at the time of the launch of this iPad2, that the tablet is a rival not topursue advantages of Apple's latest gadget, even for first-generation iPad any! He alsosaid that they think the year 2011 will be the year iPad2 property.

Unfortunately, iPad new model is expected to disappoint a lot of potential buyers,because Apple does not mention any USB port or SD Card slot, two features that manyexpected by the fans.

Apple mengumumkan aksesoris baru berupa kabel HDMI, dan Smart baru yang menggantikan casing iPad yang asli. Cover Smart ini berfungsi hanya menutupi layar, tapi bisa melipat ke dalam sebuah tabung berbentuk segitiga yang berfungsi sebagai alat untuk perangkat agar bisa berdiri. Cover ini melekat melalui gesper magnetik yang secara otomatis sejajar untuk menutupi layar. Apple juga mengungkapkan bahwa iPad2 ini akan menggunakan IOS baru versi 4. Untuk iPad2, mereka akan menambahkan beberapa perbaikan.



Intel Acquires McAfee

Finally, the merger was completed approximately six months after the first Intelannounced that it has agreed to acquire 7.68 billion worth of McAfee. The deal wouldcombine the largest CPU manufacturer in the world with the second-largest securityvendor computer.


In making acquisitions, Intel cited a need to improve security at the level of siliconintegration. The company has said that it would look to integrate McAfee's security products are not only to the PC, but also in the embedded computing space
Intel has added security as the third pillar of what people demand from their experiencewith personal computers and other related devices," said Renee James, vice presidentand general manager of Intel's senior.

"The acquisition of McAfee add not only the world's leading security products andtechnologies for Intel's portfolio of computing, but also bring highly talented peoplefocused on delivering products and services that help make the connection to the mobile Internet a safer and more secure."

Approval of giant deals are not always guaranteed. Shortly after the companyannounced the merger, regulators in the European Union warned to be careful on theplan and possible anti-trust implications.

Finally, the merger was approved after Intel agreed that he would not use his position toprevent other vendors of security products for the development of chip.

source: Intel

Graphic Design

Nowadays we often hear about Graphics and Graphic Design, fuck the hell was that?.Graphics means the image, where each image contains a message that will be delivered the creator of the image to the public. While graphic design is a science and expertise in the design of communication media to convey messages to others whether it be information about a product and services, ideas into visual form.

graphic design

A product design that has been published to the public, created through a process of stages or levels.

Visual Comunicator
Is the first person to receive messages from clients in the manufacturing of a product information. Visual Comunicator learn to whom the message was transmitted, with the aim of what the message conveyed, who the maker of messages and create ideas on how a visual form of his message was.

Visualiser
People who follow up the idea or the idea of ​​Visual Comunicator, he was assigned to visualize / describe an original idea is still in imagination into the form of rough sketches (draft) of what they catch. It takes people who have high ability in drawing illustrations are in this position.

Copy Writer
Finished a draft, then became the task of copy writer to design the right words for the design, sometimes the success of a copy writer in processing her words could be a mascot and boost the attention to graphic design created. Landing copy writer should be able to capture ideas and communicate ideas to the audience for people who see it follow the messages we convey

Graphic Workers
The concept already exists, the draft has been made and the draft has been prepared words, then became the duty worker to arrange typographi graphics, layouts (layout), picture elements in order to become attractive, and has a high value artisitik. The next task is to prepare the work of graphic work is to be submitted goto the printing. A deainer is a designer, create a work that originally did not exist into existence, rather than repeating an existing work, if the designer to repeat the pre-existing works, more appropriately called a graphical workers. A designer has no reason to repeat the same elements in his work, because destination and delivery pesanya will never be the same.Even if the same course with good reason, for example in different periods ..

Works of fine art is different from the work of graphic design, graphic design has a purpose for receiving messages to or affected towards our message to the next follow what the message conveyed by the doer. More emphasis on graphic design principles of communicative than artisitik. Graphic works will be futile if a graphic work of high artistic value, but has no communicative value to say.

Hopefully Helpful
Thank you
Fery Gunawan

Smart Book, All in One Device Komputer

Progress in the world of gadgets raises various kinds of new, innovative gadgets. Look at the Smart Phone so many who have kecangihan in mobile convenience. Not only that, the notebook market also compete with various innovations. We also presented with acomputer tablet that also started a lot of gadgets ogled by the hunter.
Reported KabarIT of Crunchgear, Smart Book is one of the all in one solution kebuuhanthis. With Smart Book you have Notebook, Tablet PC and Smart Phone. All of them canwalk together and can also run each.
Tablet PC which is also the screen can be separated from the keyboard. Using theARM Cortex-A8 CPU with 512MB RAM storage device while an 8GB NAND flash and256MB microSD card. Wireless connection using 802.11b/g/n and Bluetooth 2.1.
Smart Bok also features a mini book that is more similar to the Smart Phone. SmartPhone can be used to launch applications, web browsing and can also be used forVOIP.
For the operating system, the company provides a choice between Ubuntu, OS Androidand Google Chrome. You can buy the whole device with a price of $ 549, or purchasedseparately at $ 199 permasing each device.
Kabar IT


Beware, 12 which is worth Cyber ​​Fraud Caution Ahead at End of Year

New Year holidays become cybercriminals' favorite time in recruiting the victims in the virtual world as much as possible. Given the habit of buying Christmas presents in a number of countries, the scammers (perpetrators of fraud) also offers the lure of a free product that actually is a trick to steal your important information, including credit card numbers.
Recently, security software company McAfee released a list of 12 scam (fraud) that should be wary of Christmas and New Year, read and find out more.

1. Offers Free iPad
This year is the year and iPad tablet computers no doubt become a thing everybody's dream. Utilizing fame iPad, scammers also took the opportunity to pretend to give a gift IPAD to customers if they buy certain products. Offers by email or spam will ultimately require the user to provide their credit card number. In addition to e-mail, the lure of free gadgets Apple output in also spreads via Facebook, Twitter and other social networks in the form of a quiz with prizes iPad. The victim then asked for his phone number and without them want they have become victims of mobile phone scam that sucked money as much as 10 USD per week.
2. 'Help! I Robbed '
Scam this travel has long been rampant in cyberspace. The strategy is to spread the message to family and friends that the sender of the message have tragedy theft when I travel. They also ask transferan money to be able to go home. Be careful, do not be fooled.

3. Promotions Gift Card
According to McAfee, via social networking, promotion gift gift scammers carddengan intent to steal information and money to the victim. The information will then get a brand sold at the marketer or thieves ID.

4. False Jobs
Fake job targeting job seekers who are looking for extra money during the holidays is another trick of the scammers. Scam Twitter known to have provided a malicious link that leads to jobs with high pay. Then, they will ask the victim's personal information such as email addresses, home addresses and other numbers as a condition of employment was false.

5. Smishing
Smishing is in the form of SMS phishing. The sender claimed to be from your own bank or online store that says that there is a mistake in your account. You also asked to call a certain number in order to check the account information you have. The personal information you also become targets. McAfee confirmed, during the holidays, the criminals are aware that consumers are put through a lot of shopping online and check their money in the bank on a regular basis.

6. Rental False
With many people looking for rental vehicle during the holidays, the scammerpun pretending to be a rental service which require payment at the front via credit card or transferan money.

7. Scam Recession Still Continues
Trickery offering low interest loans is continuing since the time of resesi.Scammer target customers who need loans in difficult times. Scammerpun ask the victim to transfer a processing fee that was entered into the pockets of scammers themselves.

8. Electronic Greeting Card or E-card
In the Internet era, sending greeting cards are tangible e-card of choice for some people. But be careful in choosing an e-card spread across the Internet. It turned out that the cyber criminals many of which have made a fake e-cards in which there is a link that contains computer viruses and other malicious programs.

9. Product with Price Italic
Do not be fooled if there is a product offering low prices. This offer is usually appear on auction sites or fraudulent sites. The goal still remains the same that is stealing money and your personal information.

10. Charity Scam
Community minded donors scammers targeted next. Via phone or e-mail, they pretend to ask you to donate money to the veterans foundation or other foundations engaged in the humanitarian field.

Dangerous
11.Download Themed Vacation
Do not be deceived by the holiday-themed screensavers, jingle and animation attractive for download. This is the easiest way for the scammers to spread viruses and other computer threats, especially when the link came from an e-mail or IM your friends.

12. Vulnerability in Wi-Fi Connection and Airport Hotels
Be careful in using public networks because hackers often infiltrate via this network. For those who will travel, as much as possible to avoid accessing your bank account while in the hotel or airport. Giving credit card numbers online in public places berWi-Fi is a very risky act of theft.
Source: ictwatch.com