The Auto ISO setting on the Fuji X100 had me confused the first time I used it. Initially my reaction was, this can't be right. Since, I have read many forum posts asking for a better explanation on how it works and why it does what it does, but I failed to locate a clear explanation. After much thought, I finally figured out the logic behind Auto ISO used by the X100. I assume the X100S works similarly.
You are here
Edward Snowden, Bradley Manning, Julian Assange, these are some individuals who have suddenly splashed across the pages of newspapers and TV screens. These seemingly ordinary people have upset powerful governments and are now being branded as traitors. But I believe they foretell the dawn of a new era, an era of supercomputing. These individuals are the some of the first to reach the crossroads and point out to us how dangerous this era could be.
Sound Transit is a collaborative site where individuals upload high quality audio recordings of every day sounds, called field recordings, together with a short description of the main activity contributing to the recorded sound and their location, city and country.
There is so much noise around LEGO Mindstorms on the web with enthusiasts and universities all attempting to do the NeXT big thing that it is hard for kids wanting to do more with their Mindstorms kit to figure out what is happening.There are three different Mindstorms kits and on top of this there is a plethora of tools for programming, different versions of NXT firmware and NXT software. This article aims to provide concise information and resources to budding Mindstormers.
As Christmas time nears, there is a good chance that you are looking to buy a tablet computer or are going to receive one from Santa. There are an extremely large number of tablets around with manufacturers new and old trying to get a piece of the tablet computer market. But how have these tablets come about and what should you know before you decide to buy them. Lets take a look...
A "webapp" short for web application is a computer application that works over the internet in the Internet browser. It does not require installation of any software except for the Internet browser itself. Web applications are a relatively new concept. There are some popular webapps around, the most well known are perhaps Facebook and Flickr and lesser known Trello. The success of these webapps has prompted some companies to attempt to convert their traditional client only or client-server applications into webapps. But writing webapps can be far more challenging than writing traditional client only or client-server applications. So before you start take a look at these gotchas and ensure you are well prepared for them.
With the Intel Atom and the Core i series of processors, laptops featuring up to 7 hours of battery life are now available. Which means you can leave the power supply home and walk out with your laptop into the sun or go to a coffee shop.
When you buy software, how can you tell if it is genuine? And why should you be bothered if it is not? I share a recent experience.
Intel Core i (mobile) based laptops have hit the market. Core i replaces the formally high-end performer Intel Core2 series. Intel has been leading the innovation in low power processor chips since the Intel Atom and has incorporated those improvements into the Core i series. But there is more...
Some of you, like me, may have walked into a bookshop recently or an electronics superstore perhaps and noticed a new section featuring the plethora of e-book readers that have come into the market. If you pick up one of these and play around with it, the first thing that will probably strike you as different is how 'paper like' the text display appears. Well you are looking at Electronic Ink or e-ink.
Laptop prices are on the rise and they will continue to do so, making laptops an expensive investment. In this article I am going to discuss some of the techniques you can use to prevent loss of your beloved machine and its data. I am going to focus on physical theft of data because many people don't do enough to avoid this. I'm also going to explain how to build security in layers, making it tighter as you go deeper.
Steampunk is a form of art where modern day objects are transformed to look like 19th century steam powered devices. An example is this laptop complete with its power-on key. Rich Nagy the creator of this beast sums up his passion for tinkering with technology "[Computer technology] was robbed of the fleeting, wonderful period right after invention, where it is celebrated and honoured by the finest craftsman, artists and creative minds and given a structure befitting its potential and greatness."
In the last few months I've had a hard time finding a reasonably priced dual core processor laptop in the consumer PC market. Most of the models I loved have been discontinued and moved off the shelves. You would think that they have been replaced by more powerful models, but no. Computer manufacturers are taking a step back in time and actually building slightly less powerful laptops but instead offering more portability and style. I take a trip down memory lane and look at the philosophy behind the next generation of laptops.
In the recent CEATEC Japan 2009 exhibition Sony presented a conceptual prototype of the future VAIO laptop that would use the flexible OLED technology or FOLED. While these may look and sound fairly futuristic, FOLEDs could become common in mainstream electronic devices of the future.
It seems that wireless devices are taking over our lives. Starting with wireless internet most other computing devices are now also wireless. We have wireless keyboards, wireless mice, wireless telephones, wireless headphones and wireless CCTV. Companies that sell these devices are fairly quick to point out how convenient it is to use the wireless device and how long the wireless range is, but very few of them actually publish information about if the wireless communication on the device is secure.