Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Nokia Unveils Windows Phone Nokia

Written By Heru Prasetio on Monday, August 15, 2011 | 12:55 AM

In order to compete in the midst of a smart phone, now Nokia has launched the Windows Phone Nokia. Nokia telecom equipment manufacturers continue to make reforms in the manufacturing flagship mobile products.

Large-scale marketing will introduce about the launch of Nokia products are Windows based, Unfortunately, mobile phones sophisticated artificial Finnish company only sold in the United States.

Chris Weber, President of Nokia USA said, the application on Windows mobile phones from Nokia like the features that are provided in the mobile phone is sophisticated.

However, Nokia did not specify the time of the launch of the latest phones. According to reports, a very exclusive mobile phone it should even be purchased through operator assistance.
Nokia-Unveils-Windows-Phone-Nokia
Nokia Windows has a variety of unique applications which will spoil its users. One of them, the mobile version of Skype for Windows Phone. Windows mobile phone was made after Nokia entered into a collaboration with Microsoft software technology company in February.
12:55 AM | 0 comments | Read More

Finding Lost Children Using iPhone Application

Written By Heru Prasetio on Saturday, August 13, 2011 | 12:27 AM

A free iPhone application from an member FBI is on offer to all parents of New Mexico in handling some cases their children are missing.

Mobile applications of the iPhone this is the first made by the FBI, the application provides a convenient place for electronics, and can also be used to save photos and other information, especially to find missing children.

Iphone application also includes tips on keeping children safe as well as specific guidance on what should be done on the critical first hours after a child has some go missing.

Parents can show pictures and give a physical identifiers such as height and weight to a police officer or security in place. Using a special tab on the application, you can also quickly and easily e-mail information to the authorities with a few clicks.

FBI works to publish an application with the American Football Coaches Association, which produces public service announcements about the application and will spread the word at football games during the upcoming season variety.

Now, the app ID Children are only available for use on the iPhone and can only be downloaded for free from the App Store in ITunes, but the FBI plans to expand this tool to other types of mobile devices in the near future. The FBI also will add new features - including the ability to upload other images stored on your smart phone - in the coming weeks and months.
Finding-Lost-Children-Using-iPhone-Application
12:27 AM | 0 comments | Read More

Arine 5 Satellite Launches High-Tech

Written By Heru Prasetio on Sunday, August 7, 2011 | 9:56 AM

A very high technology development, now Ariane 5 Launches Two Satellites have a very high tech. Launch of Ariane 5 from Kourou launch center in Frence Guiana. Europe's rocket was carrying two high-tech communication satellite, Astra 1N and BSAT-3c/JCSAT-110R.

With this is his fourth mission as well as the launch of Arine 5-203 satellite to a very high-tech than in 2011. Astra 1N, which is assembled in Toulouse, France, weighs about 5.350 kilograms (when driving). This satellite is equipped with 52 active transponders, and is expected to operate up to 15 years.
Arine-5-Satellite-Launches-High-Tech
Launch of the Very High-tech from arine 5, this was delayed two times Linked to technical problems and the weather is very bad. and according to some information obtained from several sources, BSAT-3c/JCSAT-110R manufactured by Lockheed Martin Commercial Space Systems in Newtown, Pennsylvania. Conductor of the signal works as Japanese-owned telecom operator B-SAT Corporation and SKY Perfect JSAT Corporation. Similar to the Astra 1N.

Thus the spacecraft is able to work and survive up to a dozen years into the future. Arianespace will plan and execute missions in six this year.
9:56 AM | 0 comments | Read More

World's Most Expensive Sports Cars Will Released In September

Written By Heru Prasetio on Tuesday, August 2, 2011 | 9:59 PM

A Sport Car manufacturers will soon release a highly Most Expensive Sports Car in the world, the plan will be immediately Sports Car in the upcoming release in September by introducing a new Sport Car products. a newspaper that blows, that Lamborghini's new car is Elemento Sesto.

A plan, will introduce a Lamborghini sports car is soon to be released next month of September, in the mat Motor Show which will be open in September next, and also introduce a very expensive car in this world.

Sport car is in addition to price is very expensive in the world, this sports car is also a car that is very preferential. For the Lamborghini Sesto Elemento manufacture materials using carbon material for the entire material. Sesto Elemento own name seems to refer to the number of carbon atoms of the element which is the figure 6 (Sixth Element).
Word's-Most-Expensive-Sports-Cars-Will-Released-In-September
By using the carbon fiber body weights Sport Car has become very light with only 999 kg. Super lightweight body is also a benefit for the speed enthusiast.

With an extremely lightweight body, the impulse machine could bring ferocious typical Lamborghini Sesto Elemento ran 0-100 km / h in just 2.5 seconds, with a maximum speed reaches 354 km / hour.

Ability is obtained from the ear of a capacity of 5.2 liter V10 engine that reportedly will strengthen the kitchen of this Italian car racing. This machine has a power of 560 horsepower.

According to news obtained, Sports Cars will be produced in very limited quantities of about 20 units. And because the specifications are almost perfectly with the amount of production
very limited, it is no wonder that most likely the price of this car will greatly deplete the pockets of the millionaires. Chances are, Lamborghini Sesto Elemento be released at a price range of U.S. $ 2.9 million or around Rp 24.6 billion.
9:59 PM | 0 comments | Read More

IPad2 Made From Ancient Animal Bone

Sounds indeed very strange but, IPad2 computer tablet is made from ancient animal Bones are rewarded with a fantastic price. IPad2 that the seal by the bones of Tyrannosaurus rex is on sale at very very high, around 5 million Poundsteling or Rp 68 billion.

not only that, the material IPad2 manufacture of ancient animal Bones is also very special, special IPad2 manufacture this material is also coated with 24 carat gold and gemstones are very step.

Designers IPad2 this way the author of the ancient animal Bones and very luxurious it was Stuart Hughes. He covered the product of step with stones Aplle ammolite 75 million years old. He also added the T-Rex bone to the front IPad2. carnivorous dinosaur thigh bone was then measured and plugged into the computer table ammolite.
IPad2-Made-From-Ancient-Animal-Bone
IPad2 which has become a masterpiece was made ​​only two units. So far, Hughes was known as the designer 'gadgets' most unique. He said he was happy when I had to decorate his gadgets.
6:57 AM | 0 comments | Read More

IPhone 4 Hold Throw Down Forcefully

Written By Heru Prasetio on Tuesday, July 19, 2011 | 2:46 AM

keunggulan-Iphone+4-aplikasi
A highly sophisticated technology and powerful, how not, from a height of four thousand feet or (13,500 feet) IPhone 4 owned by a parachutist free fall from that height, but the IPhone 4 is still intact, not only that the IPhone 4 was also still functioning . but the glass surface despite broken, but IPhone 4 belongs to a free diver was it turns out can still make calls with the IPhone 4.

sounds indeed highly improbable, but according to the disclosure of a parachutist IPhone 4 is still sending signals even though falling from a height of four thousand meter.by parachutist, he put his IPhone 4 in his shirt pocket for a moment before making the jump from an airplane to do the freefall , and when he got ashore he realized that his IPhone 4 no longer in bag.and he thought that was the end of his history IPhone 4.

Once he realized that his Iphone 4 are not in the pocket again he tried to find her Ipohone using the application 'Find My IPhone' on the iPad-nya.dan finally a free diver had found his Ipohone 4 that fell from a height of four thousand feet is not far from the landing site of a parachutist parachutist the.and one of my friends was fun to try to contact him, his teryata IPhone 4 who fell from a height can still be very surprising rings.news is indeed the consumers who had complained IPhone 4 reception signal at the antenna when the iphone 4 was released, the year then.partly many iPhone users say the signal received four phone IPhone 4 is reduced drastically if the users of the IPhone 4 hold it a certain way.
2:46 AM | 0 comments | Read More

Sunken Wreck of The 105 Year-Old Found

Written By Heru Prasetio on Monday, July 18, 2011 | 4:39 AM

At age 105 years ago, a sunken ship sailed into Lake Ontario with a coal which is about 480 tons, unfortunately ship sank to the bottom of the lake nearly 105 years ago.I 'which fabulous sunken shipwrecks 105-year-old still looks remarkably intact and looks clear with using side scan sonar and a remote control bkapal dive, the wreck is still visible awake by the cold water at the bottom of the lake.

sunken wrecks have historic value is 105 years old, exactly in November 1906 under and the section sunken ship is leaking because the weather is very labor, thus causing the sunken ship was sunk ten miles off the coast sodus.of a very important part of The sunken ship is a bilge pump, which forced limitations the sunken ship.
In a northeast storm that happens, the sunken wreck was sunk 105 years old, it makes the whole crew pressed and suddenly fell at sunken ship would sink, at a depth of 50 meters from a sunken ship sink.wrong an inventor sunken wreck which nearly reached 105 years old is very very happy to see the wooden wreck is still in very good condition, this happens because thanks to the cold lake water so as to maintain the durability of timber ships, despite the invasion of coral populations also help degrade the carcass sunken ship faster.
Although the rigging and the screen is shattered, but the anchor and the rudder is still there even though it was closed reefs since the 1970s.
4:39 AM | 0 comments | Read More

Download and Specs Microsoft Windows 8 OS

Written By Heru Prasetio on Sunday, July 17, 2011 | 8:30 AM

Microsoft Windows 8

Are you interested to download Microsot windows 8 which has the features and better performance than Microsoft Windows 7? Although it comes with better features, Microsoft Windows OS 8 was still friendly hardware and will run on various machines because it has the same hardware specs with windows 7. According Torms Hardware, OS Microsoft Windows 8 will not be released in 2012 because it is still in the process of perfecting the various features.

To publish the specifications we will immediately after download this microsoft windows 8. Clearly this new Windows OS will have a specification that is not much different from previous Windows OS is 1 gigahertz (GHz) or 32-bit (x86) or 64-bit processors (x64), 1 gigabit (GB) of RAM (32-bit) or 2 GB of RAM (64-bit), 16 GB hard disk space (32-bit) or 20 GB (64-bit) and DirectX 9 graphics device driver with WDDM 1.0 or higher again. This is really wonderful because with better features keep it running requires little hardware.

Downloading microsoft windows 8 is the same way with us to download windows 7, but we have a long wait for Windows 8 is still not released before 2012, which all of its features and performance similar to Microsft windows 7.dan everything will be able to download it for free, and can We use as an ingredient or needs that we need in our respective needs.
8:30 AM | 0 comments | Read More

Sony eReader Will be released in August

Written By Heru Prasetio on Friday, July 15, 2011 | 11:07 PM

Sony unveiled its newest product that is sony eredaer to be launched in August next.
of sources of information obtained from Mashable, which is the largest company in launching its newest product jepeng
that the estimated price of USD 180 to USD 300.

From some of the information he had not released any price whether it be it price or what features.
launch of the Sony eReader is going to compete with Amazon Kindle to be launched in August next,
but before Sony launches its newest product will enter the sony ebook technology.

Some of the differences that will be launched by Sony eReader in August next, ie, output eReader Barnes & Noble,
Simple Touch and Color Nook, which is different from the others, tapimempunyai the same capabilities with a PC tablet.
Sony eReader with it will dominate the market launch of the newest in recent years.

EReader market is increasingly heating up to the entry of the latest version of the eReader from Sony to the market this year.

As quoted by Mashable, the giant Japanese electronics company plans to launch the latest version of the Sony Reader in August with the price range of USD180 to USD300.

EReader latest device designed to compete with the Amazon Kindle, will enter the market before Sony launches its first tablet this year. Sony's own party also plans to incorporate technology into two tablets ebook they are called S1 and S2.

"We have not released any information, whether it's price, features, and the time of launch," said the Sony representative.

The Sony Reader is expected to compete with current market leader in the category of eReader, which is Amazon Kindle. In addition, the Sony Reader will also compete with Barnes & Noble eReader output, namely Nook. For now, all devices are priced at USD139.

That little distinguishes the output eReader Barnes & Noble, Simple Touch and Color Nook, with the other device is to have some similar capabilities with a PC tablet.

At the same time, Amazon reportedly is developing a tablet, which would make Sony must be aware of the increasingly harsh competition in the market eReader
11:07 PM | 0 comments | Read More

Internet Security For All

Written By Heru Prasetio on Thursday, July 14, 2011 | 1:19 AM

Internet as a public data network is very doubtful security for commercial transactions / business. How is the work done to ensure the security of data transmitted over the public Internet network will be explained at this opportunity a try. The form of this paper will base himself to answer some questions that frequently arise. Some additional stories about the resilience of the RSA security system will also be developed & tested may be the extent to which the input resistance of this system. Information on security is actually pretty easy to be obtained on the Internet such as at http://www.netscape.com, http://www.rsa.com or through various search engines on the Internet using keywords related to network security.

Web as a medium for business applications on the Internet is the most attractive tool for interactive & multimedia capabilities. Rapid development of the Web server is quite fast, it can be seen clearly from the chart the growth of the Web server on the Internet is published by the WebCrawler one of the major search engines on the Internet. Questions that often surface when we are faced with the reality of doing business on the Internet via Netscape Navigator or Microsoft Explorer include:

1. Why have security features?
2. What are the minimal risk that should be covered by the Internet users?
3. How can security technology secures your browser from this risk?
4. To what extent is the existing security features in the browser can help us withstand the risks are there?
5. How can we see the level of security of the document that we are currently seeing.
6. How do we know that we are using Navigator which is operating in encrypted mode?
7. Is such a method is needed certification / authentication to use the Internet safely?
8. Is it possible / safe to send personal information over the Internet, such as credit card numbers?
9. Whether to enable security features then we will add the limitation to access various sites on the Internet?

Well let's look at the answers from each of the questions that often appear one by one.

Why have security features?
Security is a basic prerequisite because it is basically the Internet is an insecure network. Millions of computers form a network of public Internet where communication can be heard in the middle of the road. As data moves from sender to receiver, certainly through multiple connections (routers etc.) before reaching its final destination. This means that other computers outside the two computers that communicate with each other is very likely to access that data. Therefore, security is an absolute prerequisite if we want the data we are saved through the public network.

Risk anything that should be covered by the Internet users?
Basically when the data is sent over the Internet will be open on three (3) kinds of security risks, namely:

1. Eavesdropping - listening to the conversation of the computer between the two computers are talking privately.
2. Manipulation - the computer will replace the information in the transmitted data.
3. Impersonation - a computer will pretend to be another computer (eg a computer where the transaction of trade).

Actually this situation is exactly the same as our condition when purchasing mail order over the phone. Third above the risk will occur during mail order transactions.

How can security technology secures your browser from this risk?
At this time there are a lot of software development and computer security that can be run on a computer network. One of the rapidly evolving include Secure Socket Layer (SSL) developed by Netscape. SSL is basically a set of rules that tells the step that must be passed to increase the level of communications security. SSL rules are designed to do:

1. Encryption, to overcome the eavesdropping
2. Data integrity, to overcome the manipulation
3. Authentication, to cope with impersonation

It should be understood that SSL will only protect us when the transmission data only. This is called network security. SSL protocol at all will not protect the data - before and after the communication made. It means we have to believe fully that the seller / merchant does not give credit card numbers that we have to others.

To what extent is the existing security features in the browser can help us withstand the risks are there?
The Internet is basically an insecure network. Actually there is no security techniques in the world who dare to claim as a technique that can not be translucent / safest. For that we need intensified its Internet users to ensure its safety to do a few things below:

1. Always use the latest version of the software used. Generally, software vendors will release the latest version to fix various security holes / bugs.
2. As far as possible use the highest security version. Currently Netscape users in the U.S. & Canada can use Netscape software that has 128-bit key that will provide much higher security than 40-bit key that is currently be exported out of U.S.. Regulation in the U.S. is being fought for the change to allow the use of high-bit key.

Setting up the security system?
Basically, a security system will be divided into two major things, namely:

1. Cipher suites are kryptografi algorithm that is used for a communication; generally used several algorithms at once. SSL uses an algorithm to verify identities, one for encryption of data on traded, and a longer algorithm for message integrity.
2. Certification is used for binding a (client or server) to a public key. A sertifikatpada essentially a data file with several pieces of information in it. This information includes:

• "Name" which explains the certificate holder.
• Public key of certificate holder.
• Authority certificate, which will provide such information, serial number, expiration date, and digital fingerprint.
.
How do we know that we operate browse're in a safe condition?
If you are using Netscape then in the destination URL should be https instead of http:// so there is the letter "s" after http. In addition, at the bottom left corner, images of the connected - not separate as usual at the time of surgery performed.

Is certification required to use the Internet safely?
Sertikat required by at least one of the units / computers that communicate using SSL. Since 1996, certification is generally done by the server, which will authenticate the identity and receive information from visitors to their site in a protected communications environment. This pattern is widely used by many sites that sell goods on the Internet. Today more and more individuals who have a personal user certification primarily to send mail safely and for authentication purposes.

How about sending personal information like credit card numbers?
We can send your credit card number if at the time the security is enabled in brwoser (https) as well as on the server. By using the communication channels has enabled the protection it will be reduced risk of fraud, etc. at the time the information is transmitted over the Internet.

One thing we have to guard is that we have full confidence in receiving such financial information. Security technology will only secure lines of communication but it will not security us to people who are reckless behind the server there.

Is the security features would limit the possibility for us to access the Internet site?
Not at all, even we can still receive mail & news both in encrypted and non-transparent manner.

Hopefully a few answers from the Frequently Asked Questions (FAQ) above will give some idea about the ongoing effort to secure Internet for businesses. Next we will further deepen some of the issues related to the development of security protocol itself. Security protocol development efforts in line with the various attempts to download the challenge / breaking the protocol which is an international contest.

Secure Sockets Layer
Netscape has been designing & specifying the protocol to ensure data security between application layer protocol (such as HTTP, Telnet, NNTP or FTP) and TCP / IP. Security protocols it is called, Secure Sockets Layer (SSL), which provides data encryption, server authentication, message integrity and options for client authentication during connection TCP / IP takes place.

SSL protocol is basically a non-proprietary & open. MD5 and RC4, two of cryptographic components (very good) from the SSL, designed by Ron Rivest of RSA Laboratories . SSL has been introduced into the W3 Consortium (W3C) working group on security to be seen likely as a standard security on the World Wide Web browsers & servers on the Internet. The final version of the SSL protocol has been incorporated into the Internet Engineering Task Force (IETF) and is available on the Internet as an Internet Draft. We even can easily participate in the development of this protocol in a way to subscribe to the mailing list IETF for that purpose. How:

1. send mail to ietf-tls-request@w3.org
2. in the subject write "subscribe"

It is also a mailing list can subscribe ssl-talk@netscape.com which by the way:

1. send mail to ssl-talk-request@netscape.com
2. in the subject write "subscribe"

To learn more of the SSL can be obtained by visiting the following sites:

1. http://home.netscape.com/eng/ssl3/index.html - which explains in detail of the Secure Sockets Layer version 3.
2. http://home.netscape.com/info/security-doc.html - documentation from Netscape about the security aspect.
3. http://home.netscape.com/assist/security/ssl/protocol.html - Secure Socket Layer.
4. http://home.netscape.com/assist/security/ssl/howitworks.html - how SSL works.
5. http://www.consensus.com/security/ssl-talk-faq.html - Frequently Asked Questions (FAQ) about SSL.

RSA
RSA is headquartered in Redwood City, California is one of the areas of security research institution that is large enough, especially in the field of data encryption. RSA public key algorithm is one used by Netscape's SSL. Currently RSA Labs is developing is called:

Public-Key Cryptographics Standards (PKCS)

developed since 1991 with Apple, Digital, Lotus, Microsoft, MIT, Northern Telecom, Novell and Sun. Standard yng developed include things such as RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-certificate syntax, cryptographic message syntax, private-key information syntax, and certification request syntax. Details of articles on a variety of these standards can be easily taken from the RSA in http://www.rsa.com/ Homepage.

To conduct information dissemination and interaction with experts / enthusiasts world kriptograpfi several mailing lists have been created by RSA regulated through majordomo@rsa.com. The mailing list is:

pkcs-tng@rsa.com - PKCS The Next Generation.
cryptoki@rsa.com - Cryptographic Token Interface Standard.
pica@rsa.com - Platform-Independent Cryptography API.

Pretty Good Privacy (PGP)
PGP is one for the security protocol that is widely used on the Internet in addition to SSL. PGP is actually far more difficult in the collapse rather than SSL. This is due to the length of keys used in PGP is much longer than the SSL so that the forcible break-ins are very difficult to do, albeit with a few million computers in parallel. Discussions about this a lot done in the newsgroups sci.crypt and alt.security.pgp - seems to indicate that there is consensus that PGP - Pretty Good.

Just picture to break PGP by PGP 1024-bit key messages will need about 300,000,000,000 MIPS year. So really it takes a lot of time & money to make inroad it. To view the details of the attack to PGP can be seen on the FAQ located at http://axion.physics.ubc.ca/pgp-attack.html.

International versions of PGP Software in coordinated by Stale Schumacher can be obtained easily from the Internet at the following address:

http://www.ifi.uio.no/pgp/download.shtml
ftp://ftp.ifi.uio.no/pub/pgp/
ftp://ftp.encomix.es/pub/pgp/
ftp://ftp.ox.ac.uk/pub/crypto/pgp/

Or via e-mail by sending mail to pgp@hypnotech.com with PGP GET command in Subject.

Places to find more information about PGP can be made via the Internet:

http://www.ifi.uio.no/pgp/
http://www.prairienet.org/ ~ jalicqui / pgpfaq.txt
ftp://ftp.uu.net/usenet/news.answers/pgp-faq/where-is-PGP.Z
http://world.std.com/ ~ franl / pgp / pgp-passphrase-faq.html
http://axion.physics.ubc.ca/pgp-attack.html
ftp://net-dist.mit.edu/pub/PGP/PGP_FAQ
http://world.std.com/ ~ franl / pgp / pgp.html
http://www.mit.edu:8001/people/warlord/pgp-faq.html

Burglary Business Security Systems.
As we all know that no system is perfect in this world. Therefore, attempts to break into security systems developed in recent years even in my contest on the Internet to test the extent to which level of difficulty to penetrate the security system. Results from the burglary attempt is usually a feedback for the designers of security protocol for which was repaired. It's good writing done in chronological order.

July 14, 1996: It Finney posting of SSL challenge: a record of "secure" session that Netscape uses the RC4 algorithm in encrypt-128-EXPORT-40.

August 15, 1996: Two groups of successfully solving the challenge SSL. The first group is David Byers and Eric Young , in collaboration with Adam Back solved at 10:43 . Two hours later, Damien Doligez managed to solve at 12:23. Interesting to look at the length of time to master the science to solve the challenge took almost months.

According to Damien, in order to solve the SSL with 40-bit key takes about 40 pieces of high end Pentium PC on the hook in a computer network so it can be solved in parallel to reinforce computational skills. Please note that Damien uses about 120 computers in parallel to solve it. The time needed to solve the challenge with a force of 120 computer is about 8 days (maximum estimate will take 15 days).

August 17, 1996: Netscape submit their official responds. Although most people disagree (as underestimate) the figure of U.S. $ 10,000 for the cost of cracking algorithms SSL RC4-128 on them.

From this moment began the efforts of the cyberpunk to unite & form a network of "key cracking ring" to see how fast we we can dismantle that the encrypted session using many machines on the Internet in parallel from the ring.

19 August 1996: It Finney returned to post the second challenge of SSL to the cyberpunk to "key cracking ring". Coordinate these activities by Adam Back and Piete Brooks.

August 24, 1996: "Key cracking ring" which is a collection of computers working in parallel through the Internet network began working on the challenge, August 19, conducted at 18:00 GMT. In less than 32 hours of the results obtained!

17 September 1996: Ian Goldberg and David Wagner managed to break into a pseudo-random number generator of the Netscape Navigator 1.1. They managed to get into the session key within a few hours from a workstation.

As we saw above that in order to solve a secure SSL session with 40-bit key it takes a long time (days) 120 computer with the power of computing in parallel. This shows how difficult it is to solve a secure session. With the effort to exported versions of Netscape SSL is more secure with 128-bit key it will be increasingly difficult to penetrate the protection will exist.

Summary
Basically a variety of security algorithms developed to secure data transmission over public computer network Internet is able to secure the transmission line so it is quite safe. To break into a session that has been secured, it takes a lot of time & computers working in parallel.

We all hope that the government of the United States will soften their export regulations so that a strong security program can be exported easily to the outside of the United States &finally will enhance the security of data transmission over the Internet so that it will add to the spirit world's attempt to seek on the Internet.

Just added various newsgroup on the Internet that discuss various issues related to security include:

alt.anonymous
alt.anonymous.messages
alt.privacy.clipper
alt.security
alt.security.pgp
alt.security.ripem
alt.security.keydist
alt.society.civil-liberty
comp.compression
comp.org.eff.news
comp.org.eff.talk
comp.patents
comp.risks
comp.society.privacy
comp.security.announce
misc.legal.computing
sci.crypt
sci.math
talk.politics.crypto

Hopefully this long enough to provide outlines of an ongoing effort to secure Internet for businesses. Also expected to be the starting point for colleagues who want to explore further the issue of security / security on the Internet.
1:19 AM | 0 comments | Read More

Audi TT RS 2012 Officially Launched in the United

Written By Heru Prasetio on Wednesday, July 13, 2011 | 9:26 PM

After waiting, and in later later by the car lovers, finally the latest model 2012 Audi TT RS arrived in dealerships in the United States this summer. According to the company, this model is priced starting 57 725 U.S. dollars (or equivalent to Rp491 million), almost 20,000 U.S. dollars more expensive than the original Audi TT 2.0T models are priced at 39,172 U.S. dollars.

To spur the kitchen, issue of RS is equipped macho 2.5 five-cylinder turbo engine capable of producing up to 360-horsepower hp and 343 pound-feet of torque. It moves to the kitchen runway four wheels through a six-speed manual transmission, which can be lauched 0-60 in 4.1 seconds. While the previous model, the TT entry-level, equipped with a 2.0 four-cylinder turbocharged engine-powered 211-hp.

TT RS model can also be distinguished visually from the original model that has a lower spec in several aspects. Version of the TT sports alloy wheels using a unique 19-inch, front air intakes are larger, diamond-patterned gloss black grille, side frame, rear wing, rear diffuser that surrounds the oval-shaped tailpipes and matte-aluminum exterior mirrors.
9:26 PM | 0 comments | Read More

Assembling the World's First Fightert

Written By Heru Prasetio on Sunday, July 10, 2011 | 9:28 PM

Bolivian government's efforts in combating armed groups that control the drug trade apparently not kidding. The engineers were assigned the option to create a special fighter. For this project, in collaboration with the Chinese government. The result of six Chinese fighter aircraft K-8.

Local military officials, Battle Group Commander Air Force 34, Gonzalo Sempertegui told local media that the aircraft can be used for advanced training and tactical military operations with the ability to achieve a measured height.

K-8 fighter aircraft designed and built by 52 engineers from Bolivia and China (24 engineers Bolivia and 28 from China). Besides the engineers, 12 pilots Bolivia is also involved in the assembly who worked in the Cochabamba region.
This true fighter Bolivia obtained through loans to China. During this time, Bolivia has only training aircraft cargo and has no combat aircraft. Chinese K-8 aircraft is a first for the South American country.
9:28 PM | 0 comments | Read More

Intel Unveils 3D Transistors

Written By Heru Prasetio on Saturday, July 9, 2011 | 1:31 PM

Intel Corp. announced it will soon mass produce a chip that uses a new transistor structure with the appearance of three-dimensional (3-D). Intel called it the latest technical breakthroughs in the world of microprocessors.

As reported by Xinhua, recently, 3-D transistors, called "Tri-Gate" is the latest model on the basis of planar two-dimensional transistor structure that supports the computers, cell phones or cell phones and other modern gadgets.

"The lmuwan and Intel engineers once again re-create a new type of transistor, this time they use the third dimension," said Paul Otellini, the top executive (CEO) of Intel, said in a statement.

Intel also shows a microprocessor-sized 22-nanometer (nm) with the code name "Ivy Bridge" will be the first high-volume chip used in 3-D transistors latest. Ivy Bridge is scheduled to enter mass production stage by the end of this year.

According to Intel, the transistor 3-D enables the chip to operate at lower voltage with lower leakage than previous transistors. As well, providing up to 37 percent performance improvement versus the low voltage transistor 32nm planar company.
1:31 PM | 0 comments | Read More

"App Store" Apple Accessed 15 Billion Per Day

"Application Store" Apple, the official site of Apple product users download the application for his gadget more and more loved. The proof, the site was named as the site most frequently downloaded its consumer. As preached Xinhua, from 15 billion apps have been downloaded from App Store over 200 million iPhone worldwide.

"Thanks for all the developers who have filled this site with 425 thousand cool applications. So it is more than 200 million users or more than 15 billion IOS aplilasy download from here," said Philip Schiller, senior vice president of Product Marketing of Apple, said in a statement.

Apple's Application Store was released on July 10, 2008. Site digitally distributed applications based on Apple's platform has grown rapidly. It took nine months to reach one billion to download the application on the site. In fact, Apple has also issued a contest for the downloaders are often downloaded by providing U.S. $ 10 thousand.
1:20 PM | 0 comments | Read More

Very Super Computers In Japan

Less than a year earthquake and tsunami, the Japanese had not dimmed in the matter of technology. Recently, the giant computer company engaged in the weather control the RIKEN Advanced Science Institute for Computing in Kobe, Japan, introduced the fastest computer in the world.

The computer made in Japan was named the super computer built K Fujitsu. The engine speed equivalent to one million desktop computers. The previous record was held by China for six months. Fujitsu and the head of the RIKEN said that the project had addressed the earthquake and tsunami on 11 March.

Super computer that has the force tripled from the previous title holder and capable of performing calculations kuadrilliun every eight seconds. One quadrillion is the number 1 followed by 15 zeros and the speed of computer jargon is known as 8.2 petaflops.

Previous fastest machine is a Chinese computer Tianhe-1A, which velocity 2.507 petaflops. It confirms the growth of computer technology and the economic power of China - a country that is growing rapidly.

Tianhe-1A to China for the first time topped the list of the world's fastest computer machine to get rid of the United States (U.S.), which has four of the top ten super computers. It also recognized experts who say the development of K machines faster than five competitors combined.

There are five super computers in the U.S. in the top 10, including third on the Jaguar system at Oak Ridge National Laboratory in Oak Ridge, Tennessee. Other computers in the top ten of two machines from China, two engines from Japan and one from France, according to the Daily Mail.

"This machine is very impressive and more powerful than other computers," said Jack Dongarra who released the list of world's best super computer for six months.

The rating is based on the speed of standard mathematical equations. Making K Japanese computer cost U.S. $ 1.2 billion. It consists of 672 computer cabinet composed of the circuit board with 70 thousand processors. A computer or laptop typically uses only one processor.

With the number of processors and circuit boards, computers K spent enough energy to power 10,000 homes electricity. However, its creator claims it is saving energy.machine at a cost of £ 6 million a year.

"The use of computers is expected to affect K innovative in the field of global climate research, meteorology, disaster prevention, and medicine, thus creating a prosperous and secure society,"
1:11 PM | 0 comments | Read More

Bemo The Use of GPS

Written By Heru Prasetio on Thursday, July 7, 2011 | 11:54 AM

New Delhi: Technology or GPS navigation
systems are typically installed in private vehicles to help motorists locate destination quickly and precisely. But, GPS is now not only the monopoly of the rich.

In New Delhi, India, the GPS installed in commercial vehicles. Even including the rickshaw. Metro.setidaknya 250 rickshaws in New Delhi will be equipped with devices such sophisticated technology. SatNav device called Scheme that will serve the dual purpose of enabling the trishaw rider to track his journey. While passengers can check the map on a route that can be taken as short as possible.

This device will also be equipped with panic buttons. It allows female passengers to push the button that directly connected with the police if they were attacked.

GPS mounted on tricycles as a trial before a navigation system installed in all vehicles in the city at the end of next month. SatNav scheme is the latest attempt by city officials to improve the reputation of public transport in the capital of India.

Currently there are around 55 thousand three-wheeled vehicles in New Delhi. Thousands of people use the transportation services each day.
11:54 AM | 0 comments | Read More

Opponent Google, Facebook Hold Skype

New York: Competition in the business world is increasingly competitive social networking. A variety of new social networking sites grows each year. Google + one of them. To defend his title, the king took the Facebook social networking internet telephone company Skype Technologies.

Facebook is proud to introduce the service in cooperation with Skype, Video Chat,

This service allows users to chat her jolly while exchanging expressions. Even more unique anymore, Video Chatting on Facebook can be used together, or better known as the conference. To use it, users simply to click on a friend who wanted to chat and press the special button Video Chats. A box will appear on the computer screen that contains the option to accept or reject the call.

"The service is easy to use," said Founder and CEO Mark Zuckerberg.

Video Chat will be available to users on Facebook in the coming weeks. Hopefully, this service can spoil the hearts of the owners of Facebook accounts and persuade them not to turn away.

Previously, Google + could be a threat to Facebook. Display Google + is designed as closely as possible with Facebook. Like Facebook, Google's social networking + allows users to share pictures, stories and comments. The difference lies in additional features such as maps and other images stored in Google data centers. In addition, Google + claims helps users to easily group contacts and their friends in the system group.

However, some analysts say Google only shows what the back up and just add the video chat facility.
11:36 AM | 0 comments | Read More

Samsung Prepare Galaxy S II version of Windows Phone

Written By Heru Prasetio on Tuesday, July 5, 2011 | 1:33 PM

SEOUL - Samsung's mobile phone from the family-owned Galaxy was not the only Android alone. Therefore, Samsung will prepare other alternative operating system for smart phones.

Yes, reported high sales of Android-based Galaxy, did not make the South Korean vendors are fixated on only one operating system. The proof, they will present the Galaxy II cell phone with the operating system Windows 7 Phone.

Launched by Neowin, Windows Phone Mango version will be present at the latest Samsung mobile devices this summer, is reportedly going to come first in the United States by cooperating with AT & T.

There has been no complete information on the specifications of the Galaxy S II version of the Mango, but the outstanding issues of smart phones will be present by design not much different from its Android version. But with 4.3-inch screen, dual core processor, and 1GB of RAM, and 8 MP camera.

The Samsung is also not yet sure when this phone will be officially released to the world, and the reasons for their interest against this Microsoft's OS. Indeed, Windows Phone is 'rising', with
applications that reach 25 thousand.
1:33 PM | 0 comments | Read More

High Acceleration BMW E-Scooter

Written By Heru Prasetio on Monday, July 4, 2011 | 9:54 PM

An electric scooter concept released called electric-drive E-Scooter released BMW Motorrad. The result, the concept of an electric motor is capable of producing great power and is used for long distances.

BMW's electric scooter was invented and claimed to be able to compete in power with a motor fuel. E-Scooter has acceleration from 0 to 60km/jam speeds similar to a 600cc scooter. E-Scooter cruising capable of traveling 100 miles all electric charging.

Only, the design of E-Scooter is still looked fat. Berbodi advantage of this great scooter is great seats comfortably accommodate two passengers. E-Scooter also comes with a visor or windshield to block the wind.

E-Scooter on display in the BMW Motorrad Innovation Day 2011. Display legs and large suspension plus wide tires. The suspension became a mainstay in bagioan telescopic front, swing arm system and horizontal shock absorbers at the rear.

Battery cover seems to be order. E-Scooter kinetk also maximize energy as a result of braking power to recharge the main battery scooter. The new BMW issued a draft and not yet known whether smart motors will be mass produced or not.
9:54 PM | 0 comments | Read More

HP ToucPad comes to beat Apple iPad

Written By Heru Prasetio on Saturday, July 2, 2011 | 10:51 PM

HP-TouchPad
Hewlett Packard (HP) has launched its latest tablet PC "TouchPad". HP tried to dethrone the dominance iPad sales and revive the fortunes of HP that had fallen.

"Currently TouchPad go on sale to the distributor of the United States, such as BestBuy and WalMart, and can be purchased through Amazon.com," HP said in a statement.

This is done so HP can sell the product immediately in various countries, including Britain, Ireland, France, Germany and Canada. In addition, sales of which will then be followed to Italy, Spain, Australia, Hong Kong, New Zealand and Singapore.

Unlike the iPad, TouchPad has been supports Adobe Flash video format. These applications can run on any operating system WebOS, developed by Palm, who is also a pioneer of mobile devices that have been acquired by HP last year.

TauchPad debuted to a variety of mixed reviews and wanted to show its seriousness to challenge the iPad, although the later will have difficulty.

Last month, the Apple said it has been doing sales of 25 million units since the release of the first generation iPad in April 2010 and the second generation in March, the iPad 2.

It seems that HP will not easily rival the success of the sale of Apple products like the iPad. But the optimism of HP's noteworthy to see TouchPad is one tablet a sophisticated and able to compete in world markets.

In addition to the current iPad tablet PCs in many emerging market such as Samsung Galaxy Tab, BlackBerry Playbook, Motorola Xoom and dozens of other tablets that have been applying the other Google's Android operating system. This shows that HP's rivals are not just Apple but there are many others.
10:51 PM | 0 comments | Read More