Skip to main content

Posts

Showing posts with the label Other

CLEARink Blots

New screen technologies rarely enter the market. The two biggest reasons, among all of these concerns, are cost and appearance. If a display costs more to manufacture than competitors, it needs to look great. If it doesn’t look amazing, then consumers won’t buy it. What makes CLEARink a contender in many different markets: it’s both cheaper to produce and looks better than its e-paper competitors. The technology brims with so much promise that it won Best of Show at Display Week 2017. Sri Peruvemba, Head of Marketing at CLEARink Displays, answered several questions regarding CLEARink Display’s electrophoretic technology. Here are just a few reasons why CLEARink seems destined to become a mover and shaker in the e-reader space. CLEARink Looks Better Than E Ink The CLEARink technology looks like E Ink, but with some big differences. While both share an underlying technology (electrophoresis), the secret behind CLEARink lies in a new type of ink, co-developed with Merck, and a...

Raspberry Pi gets its own sound card and more ..

When UK Prime Minister David Cameron gave a speech at CeBIT this year, what examples did he use to highlight tech innovation in Britain? Yes, ARM and Imagination were on his list, but he also referred to the tiny, Linux-based computer called Raspberry Pi, which has now sold over 2.5 million units. In a timely fashion, the Pi's makers, element 14, have just announced a new $33,Wolfson-powered audio card that should give the device a broader range of functions. The add-on board fits right onto the Pi's P5 pins and carries a Wolfson audio processor that supports high-res audio up to 24-bit / 192KHz, which can be played via a direct connection to an amp over 3.5mm line-out or alternatively via a digital S/PDIF output. Audio recording, meanwhile, comes courtesy of two onboard MEMS mics (useful for things like voice control), a 3.5mm mic jack and a digital S/PDIF input. It's true that some of these audio capabilities have already bee...

NSA reportedly using radio waves to tap offline computers

The National Security Agency is using secret wireless technology that allows it to access and alter data on computers, even when they are not connected to the Internet, according to a New York Times report. Since 2008, the agency has been increasingly using "a covert channel of radio waves" that can transmit from hardware installed in the computers, according to NSA documents and experts interviewed by the Times. Signals can then be sent to briefcase-size relay stations miles away, according to the report. The NSA has also installed surveillance software on nearly 100,000 computers around the world, according to the Times. The newspaper said the Chinese Army was a frequent target of such technology but said there was no evidence that the agency used either technology inside the US. Repeating earlier denials that its data collection activities are arbitrary or unconstrained, the NSA rejected any comparison to Chinese attackers who have been accused to planting simil...

The Top Trends at CES 2014

The Consumer Electronics Show in Las Vegas is turning out to be a blockbuster—and with good reason. Last year's attendance topped a record 150,000, and every indication is that this year will match or exceed that number. And you would think that with Mobile World Congress looming in February that we'd see little action in the mobile space, but that's not the case. So what's hot on the CES floor this year? It's positively littered with tablets, convertible laptops, phones, fitness gadgets, cameras, HDTVs, and cars—you name it, and you'll find a ton of it here. CES is not only a good indicator of what's hot, but it's also indicative of what's dead. For example, Vizio made a big splash with its 2014 HDTV lineup, which lacks 3D support—a far cry from what you would have seen just a year ago. Consumers largely hated it, so now it's either buried in a submenu or gone altogether. CES 2014 BugManufacturers aren't giving up on smartwatches yet; it ...

NVIDIA Tegra K1 Preview & Architecture Analysis

by Brian Klug & Anand Lal Shimpi NVIDIA has taken to using CES as its platform for launching members of its Tegra mobile SoC family. This year was no different as it shifted branding a bit in its announcement of the Tegra K1, formerly known as Project Logan. With Tegra 2 NVIDIA’s big selling point was being first to dual-core in Android. Tegra 3 attempted to do the same with being first to quad-core. Tegra 4 just made things faster. Tegra K1 on the other hand does away with the gimmicks and instead focuses on fundamentals. The SoC will come in two versions, one version with a quad-core (4+1) Cortex-A15, and one that leverages two of NVIDIA’s own 64-bit ARMv8 Denver CPUs. More importantly, they both ship with a full implementation of NVIDIA’s Kepler GPU architecture. In fact, Tegra K1 marks a substantial change in the way NVIDIA approaches mobile GPU design. From this point forward, all mobile GPUs will leverage the same architectures as NVIDIA’s desktop parts. As...

Free and open courses

http://www.saylor.org/ Are professors/experts involved in creating these courses? Absolutely. You can learn about our process on the  About page , but we hire  credentialed professors, teachers, and industry professionals  who have previously taught the specific subjects they work on. These highly-qualified consultants research, design, and outfit our courses from start to finish — and all of the courses are destined to go through a  peer review process . Moreover, our consultants have attended and have taught at many prestigious public and private institutions, including Princeton, Emory, Harvard, University of Virginia, the University of California system, Carnegie Mellon, NYU, and many more — including excellent schools you many never have heard of! Are the courses free?  TOP Yes! All of our courses, resources, and associated site features are free – and always will be!

How to Automate Your Ego Searches for Ninja-Like Online Awareness

Matthew Rogers — There's no shame in admitting that you occasionally Google yourself; it's worth keeping an eye on what the internet has to say about you. But if you're manually searching your name on Google, revisiting blog posts you've commented on to see if anyone's replied to what you've said, and searching for (non-@)mentions of your company on Twitter, you're wasting a lot of time. Instead of sitting in front of your computer for an hour a day just to satisfy social curiosity, you can automate the process—and turn your ego search into an ego watch , instead. Here's how. Earlier this week, we talked about performing an "ego search" to see what people are saying about you online. Even though it's the best way to find very specific mentions on any given day, it does take up a lot of time. That's why we want to automate the process, so we can have our cake and eat it, too. The easiest way to set up an automated ego search is to tur...

How to Hide Secret Messages and Codes in Audio Files

To encode, you're going to need Coagula (Windows-only), and to decode you'll need Sonic Visualizer (Windows/Mac OS X/Linux). You can watch the video above for a visual walkthrough, but here are the steps you need to follow: Create an image you want to encode. White text on a black background works well, and it helps to have a small image without too much empty space. Save it out as a JPEG or BMP. Open the image in Coagula and click the setting for "Render Image as Audio Without Blue/Noise." Be sure to choose this option as the other rendering option will not work. When you're done a new audio file entitled "Coagula.wav" will be in the same folder as the Coagula application. You can either go grab that file or you can save it out to a location of your choice by choosing "Save Audio File" as from the file menu. That's it. Message encoded! To decode the message, open it in Sonic Visu...

How to get old gnome Ubuntu look back

Some of us dont like the new look of ubuntu , all the MAC look , so if you just like to get back to normal : 1) Log-off your computer. 2) Click on your username. 3) Then select “Gnome” at the bottom of your PC. "or ubuntu classic" 4) Then type your password and login. 5) And you get your beautiful gnome look back.

Clear cydia cache

1. Connect & ssh to your iPhone and iPod Touch 2. Now go to /private/var/lib/apt/lists 3. Delete all the files in /root/private/var/lib/apt/lists/ except for the partial subfolder. Do not delete Partial folder and you done

Remove Cydia Sources through SSH

If you added a source that causes Cydia to crash, this is the thread for you. This will help you remove the buggy source you added. You will need an ftp/sftp client. [WinSCP for Windows/Cyberduck for Mac] 1. SSH into your iPhone/iPod, hopefully you know how to do that. 2. Go to the root of your iPhone/iPod [/]. 3. Navigate to /etc/apt/sources.list.d/cydia.list 4. Download the Cydia.list to your computer and open it using any text editor. 5. Delete the source you added. For example, "deb http://www.iphone.org.hk/apt/ ./" if this is the source you want to delete, simply delete that one line. NOT THE WHOLE DOCUMENT. Make sure you save the document as is. We are NOT adding any extensions. 6. Drag the saved document into the sources.list.d folder and replace the file. 7. Respring. ALL DONE!

gp_win32_rc5.zip

And today is the big day the hacke for iphone 4.2.1 is OUTTTTTTTTTTT gp_win32_rc5.zip download it from http://www.greenpois0n.com/ yes the site is crashing but it will back in minute

Fork bomb

will if you are crazy enough like me you can open your favorites Linux shell and write : : ( ) { : | : & } ;: so what that mean ??? : ( ) # define ':' -- whenever we say ':', do this: { # beginning of what to do when we say ':' : # load another copy of the ':' function into memory... | # ...and pipe its output to... : # ...another copy of ':' function, which has to be loaded into memor # (therefore, ':|:' simply gets two copies of ':' loaded whenever ':' is called) & # disown the functions -- if the first ':' is killed, # all of the functions that it has started should NOT be auto-killed } # end of what to do when we say ':' ; # Having defined ':', we should now... : # ...call ':', initiating a chain-reaction: each ':' will start two more. have fun ;)