With the Intel Atom and the Core i series of processors, laptops featuring up to 7 hours of battery life are now available. Which means you can leave the power supply home and walk out with your laptop into the sun or go to a coffee shop.
You are here
Open Content (CC BY-NC-ND)
When you buy software, how can you tell if it is genuine? And why should you be bothered if it is not? I share a recent experience.
While the 2010 movie The Last Airbender had very little success with the critics and audiences, tracing its roots leads to the original animated series titled Avatar: The Last Airbender which is nothing less than a masterpiece in animation and creative storytelling. Set in an alternate universe the world is divided into four nations each having the ability to control one of the four elements Fire, Air, Water and Earth. The Fire nation believes its element is superior and sets out to conquer the rest. The only person that could stand in its way is the Avatar, an individual who can command all four elements. But the Avatar has disappeared and has not been seen for a 100 years.
Intel Core i (mobile) based laptops have hit the market. Core i replaces the formally high-end performer Intel Core2 series. Intel has been leading the innovation in low power processor chips since the Intel Atom and has incorporated those improvements into the Core i series. But there is more...
Some of you, like me, may have walked into a bookshop recently or an electronics superstore perhaps and noticed a new section featuring the plethora of e-book readers that have come into the market. If you pick up one of these and play around with it, the first thing that will probably strike you as different is how 'paper like' the text display appears. Well you are looking at Electronic Ink or e-ink.
Laptop prices are on the rise and they will continue to do so, making laptops an expensive investment. In this article I am going to discuss some of the techniques you can use to prevent loss of your beloved machine and its data. I am going to focus on physical theft of data because many people don't do enough to avoid this. I'm also going to explain how to build security in layers, making it tighter as you go deeper.
Smaller than a credit card the VX1i is light on the purse too with fully unlocked pay-as-you-go phones retailing from as low as £20. The pictures looked promising so I decided to take an in-depth look at this miniature mobile phone.
Alice is returning to Wonderland in Tim Burtons 2010 movie. Nuts, I wonder if you'd join her in her trip down the rabbit hole?
If Disney's Tarzan were made in modern times it would be Avatar. Its director James Cameron has put in a lot of creativity into this film and designed a world you would want to go to.
Steampunk is a form of art where modern day objects are transformed to look like 19th century steam powered devices. An example is this laptop complete with its power-on key. Rich Nagy the creator of this beast sums up his passion for tinkering with technology "[Computer technology] was robbed of the fleeting, wonderful period right after invention, where it is celebrated and honoured by the finest craftsman, artists and creative minds and given a structure befitting its potential and greatness."
In the last few months I've had a hard time finding a reasonably priced dual core processor laptop in the consumer PC market. Most of the models I loved have been discontinued and moved off the shelves. You would think that they have been replaced by more powerful models, but no. Computer manufacturers are taking a step back in time and actually building slightly less powerful laptops but instead offering more portability and style. I take a trip down memory lane and look at the philosophy behind the next generation of laptops.
In the recent CEATEC Japan 2009 exhibition Sony presented a conceptual prototype of the future VAIO laptop that would use the flexible OLED technology or FOLED. While these may look and sound fairly futuristic, FOLEDs could become common in mainstream electronic devices of the future.
It seems that wireless devices are taking over our lives. Starting with wireless internet most other computing devices are now also wireless. We have wireless keyboards, wireless mice, wireless telephones, wireless headphones and wireless CCTV. Companies that sell these devices are fairly quick to point out how convenient it is to use the wireless device and how long the wireless range is, but very few of them actually publish information about if the wireless communication on the device is secure.
C++ (not C) has a convenience feature that allows programmers to specify default parameters on functions when declaring them. The compiler uses the default value if no value is supplied by the caller for that parameter, instead of complaining about a missing parameter value. I am not going to discuss the mechanics of declaring these default parameters; any C++ book will explain this. I’m going to delve into what problems happen over time when using default parameters during software maintenance phase as code ages and changes hands between programmers.
Security is a increasing source of concern for home owners today. Bad economic times have led to an increased risk of home breakins and theft. Most security installations are done by professional organizations which will charge you a hefty sum and provide you will iron clad security. However what many home owners need is a simple deterrent system, that will stop the street thief from getting in and wiping the house clean. There are an increasing number of security products in the market which you can install yourself, but it is important to understand the advantages of using each because incorrect use could create a false sense of security while actually leaving your home more exposed than protected.