When you buy software, how can you tell if it is genuine? And why should you be bothered if it is not? I share a recent experience.
You are here
While the 2010 movie The Last Airbender had very little success with the critics and audiences, tracing its roots leads to the original animated series titled Avatar: The Last Airbender which is nothing less than a masterpiece in animation and creative storytelling. Set in an alternate universe the world is divided into four nations each having the ability to control one of the four elements Fire, Air, Water and Earth. The Fire nation believes its element is superior and sets out to conquer the rest. The only person that could stand in its way is the Avatar, an individual who can command all four elements. But the Avatar has disappeared and has not been seen for a 100 years.
Intel Core i (mobile) based laptops have hit the market. Core i replaces the formally high-end performer Intel Core2 series. Intel has been leading the innovation in low power processor chips since the Intel Atom and has incorporated those improvements into the Core i series. But there is more...
Some of you, like me, may have walked into a bookshop recently or an electronics superstore perhaps and noticed a new section featuring the plethora of e-book readers that have come into the market. If you pick up one of these and play around with it, the first thing that will probably strike you as different is how 'paper like' the text display appears. Well you are looking at Electronic Ink or e-ink.
Laptop prices are on the rise and they will continue to do so, making laptops an expensive investment. In this article I am going to discuss some of the techniques you can use to prevent loss of your beloved machine and its data. I am going to focus on physical theft of data because many people don't do enough to avoid this. I'm also going to explain how to build security in layers, making it tighter as you go deeper.
Smaller than a credit card the VX1i is light on the purse too with fully unlocked pay-as-you-go phones retailing from as low as £20. The pictures looked promising so I decided to take an in-depth look at this miniature mobile phone.
In the last few months I've had a hard time finding a reasonably priced dual core processor laptop in the consumer PC market. Most of the models I loved have been discontinued and moved off the shelves. You would think that they have been replaced by more powerful models, but no. Computer manufacturers are taking a step back in time and actually building slightly less powerful laptops but instead offering more portability and style. I take a trip down memory lane and look at the philosophy behind the next generation of laptops.
In the recent CEATEC Japan 2009 exhibition Sony presented a conceptual prototype of the future VAIO laptop that would use the flexible OLED technology or FOLED. While these may look and sound fairly futuristic, FOLEDs could become common in mainstream electronic devices of the future.
It seems that wireless devices are taking over our lives. Starting with wireless internet most other computing devices are now also wireless. We have wireless keyboards, wireless mice, wireless telephones, wireless headphones and wireless CCTV. Companies that sell these devices are fairly quick to point out how convenient it is to use the wireless device and how long the wireless range is, but very few of them actually publish information about if the wireless communication on the device is secure.
Security is a increasing source of concern for home owners today. Bad economic times have led to an increased risk of home breakins and theft. Most security installations are done by professional organizations which will charge you a hefty sum and provide you will iron clad security. However what many home owners need is a simple deterrent system, that will stop the street thief from getting in and wiping the house clean. There are an increasing number of security products in the market which you can install yourself, but it is important to understand the advantages of using each because incorrect use could create a false sense of security while actually leaving your home more exposed than protected.
The DVD player market is plagued with DVD players all of which seem to perform the same function i.e. play video DVDs. However some players will also play other kinds of DVDs and CDs like MP3 CDs. Here I take a peek at a class of the most versatile DVD players which will play almost kind of disc you throw at them.
In the small world of digital pocket cameras, increasingly the trend is to buy one with higher number of megapixels. Camera manufacturers seem to be trying to convince us that more megapixels mean better pictures. However, in reality they are not building better cameras that support higher mexapixels, they are often simply extracting more megapixels from their existing cameras.
Most browsers these days come with an integrated search box that allows you to directly use popular search providers like Google to search the internet. What is great about this search box is that once your browser is set up, it can be used to search almost any retailers website.
While it might seem like a simple task of buying a HDMI cable and plugging it in, in practice it might not work at all. So if you have tried and failed or are about to try you should be reading this.
The Mindstorms NXT 8527 and 8547 Kits do not work with the Toshiba Bluetooth stack (v6.10). However in most cases it is possible to use the alternative Microsoft Bluetooth stack to get the job done. Here is how...