New 500GB Laptop Hard Disks

 Hdd

Laptop computer storage is racing fast towards the 500G-byte level with Fujitsu becoming the third hard-disk drive maker to announce a drive at that capacity.

Fujitsu is accomplishing this capacity by combining three disk platters — the magnetically-coated disks on which data is stored — each with a 170G-byte capacity inside the drive. Hitachi, the first company to announce a 500G-byte drive, and Samsung Electronics are also using three platter designs.

The third platter increases the thickness of the drive to 12.5 millimeters versus most other laptop drives, which have just two platters and are 9.5 millimeters thick.

As a result the Fujitsu drive won’t fit into the drive bay on many laptop computers, so its availability doesn’t mean an instant capacity upgrade will be possible for all laptop users. Hitachi’s drive is also 12.5 millimeters thick, but Samsung said it has been able to keep the drive height at 9.5 millimeters on its Spinpoint M6 drive.

Fujitsu will begin selling its 2.5-inch drive in May. It will have a Serial ATA (SATA) interface and can transfer data at up to 300M bytes per second. The average seek time for reading data on the 4,200 rpm drive is 12 milliseconds and 14 milliseconds for writing data. Fujitsu didn’t announce pricing.

Hitachi said in January that it would ship its drive this month and Samsung announced a March shipping date. Both the Hitachi and Samsung drives spin the disk faster, at 5,400 rpm.

source:pcworld

eSATA, USB 2 Are Supported In G-Force MegaDisk Drive

 G-Force

Fantom Drives has introduced the G-Force MegaDisk eSATA+USB external hard disk drive. As the name implies, it features both external Serial ATA (eSATA) and USB 2.0 interfaces.

The G-Force MegaDisk comes in 1.0TB, 1.5TB and 2.0TB capacities, configured in multiple RAID options built in. Users can configure the drive in RAID 0 (disk striping) for maximum performance, RAID 1 (disk mirroring) for fault tolerance, as a JBOD (Just a Bunch of Disks) or spanned for simple large volume support.

The MegaDisk is housed in an aluminum enclosure designed to dissipate heat. The enclosure features a single eSATA port and a single USB 2.0 port. eSATA isn’t yet standard issue on the Mac; you’ll need a Mac Pro or Power Mac with an expansion card installed, for example, or a MacBook Pro with an eSATA Express/34 card installed.

System requirements call for Mac OS X v10.2 or later. It ships with USB and eSATA cables, power cord, user manual and backup software.

The G-Force MegaDisk is now available at prices starting at US$319.95.

source:pcworld 

New Multimedia Home Networking Device UNIT 2 By iRiver

Irviver

iRiver has recently introduced its new UNIT 2 Multimedia Home Networking device with an 7-inch (800×480 pixels ; 16:9 aspect ratio) touch screen interface. This multimedia device combines a GPS, CD/DVD player, FM tuner, TV tuner, VoIP phone, VoIP Video Phone, WiFi support as well as Web Browsing into a single machine, offering the ultimate all-in-one solution for integrating your personal digital content, which aimed to enhance your multimedia entertainment experience.

According to the company, the new iRiver Unit 2 multimedia station which comes with a Base Unit, Portable Unit and Remote Unit also includes both integrated 2GB NAND Flash and 30GB hard drive, with SD memory card slot to increase the memory storage.
No words on its price and launch date yet.

source: mydigitallife

Buttonless mouse Traveller 525 Laser

But-les-Mouse

The computer accessory market leader, Genius, has introduced its latest innovative buttonless mouse lately. This unique and innovative product, Traveller 525 Laser, does not have any visible buttons or scroll wheel which the conventional mouse used to has. In stead of clicking the traditional mouse buttons, Genius Traveller 525 Laser, adapted the unique float to click design idea which allows users to lightly tip the casing for executing the commands. It gives users a more relaxing mouse click feeling and reduces the tension on their fingers. The traditional scroll wheel has also been replaced with an OptoWheel. OptoWheel features an optical sensor on the mouse’s top which registers the user’s finger movements. Traveller 525 Laser has also taken into consideration on those users who are unable to give up the clicking sensation completely. Two custom buttons have been inserted in the middle of the casing to assist this group of people.

Summary of the features:
– inventive OPTO-wheel for effortless 4 way scrolling
– Turbo scroll function: lets you browse quickly through documents
– 1600 dpi laser engine for precision accuracy
– suitable for either hand
– port: USB

source:mydigitallife 

Use Of iPods in a War Zone

Ipod

As they prepare for their daily patrols around Baghdad, soldiers from the 10th Mountain Division sync up their iPods, not with songs and movies, but with a laundry list of missions and audio files containing pre-recorded phrases in Iraqi Arabic or Kurdish.

Loaded with special software, the music players help them communicate with the populace and learn the local culture, and they occasionally serve as handy tools in their tactical missions, such as searching for persons of interest. The gadgets have been so useful that troops are now finding new ways to employ the technology.

The Army so far has purchased 300 of the Vcommunicator Mobile LC devices. Since last fall, squad leaders from the 10th Mountain Division’s 1st and 4th Brigades have been using the product in Iraq.

PEO STRI plans to deploy a team to Iraq to evaluate how the devices are performing in the inhospitable environment and weather conditions.

“The nice thing is, because they’re commercial, they’re cheap to replace,” he said. Each device costs US$200 to $300.

Soldiers who are operating the iPods already have been inquiring about how to adapt the devices for other applications. One group in particular asked if it would be possible to connect the iPods to a plasma or LCD display at vehicle checkpoints so the images can be seen more clearly, said Youmans.

Bright said the company already is supplying the accessories to make that possible

This year Vcom3D plans to offer a commercial version of its software geared toward travelers, said Carol Wideman, president of the company. She said the company’s long-term goal is to make it available on the mobile device of choice.

source:technewsworld 

Tips To Take Care Your PC By Yourself

 PC-maintenece

There are manly three major thinks which can badly affect PC’s performance or its health.

·        Electrical fluctuations (surges and power loss) pose a significant threat to your system and are often the cause of data loss and burned out components.

·        Viruses and Spy-ware can be pretty irritating. Disabling system functions, high memory usage, internet bandwidth stealing to name a few. Other times, it can be dangerous as well; stealing passwords or bank and credit card information.

·        Malicious Internet may steel your resources and Valuable information’s.

 You can protect yourself from such Issues very easily by following the steps bellow.

 Electrical:

 ·        Never plug your computer directly into a power outlet. Relatively inexpensive surge protectors go a long way to protect a several thousand dollar investment. Be sure your surge protector includes enough outlets for all your peripherals and the modem jack. Modems are extremely susceptible to power surges, and are often destroyed by surges coming through the phone lines instead of the power outlet.

·        Unplug your system during lightning storms, even if it is surge protected.

·        Obtain an Uninterruptible Power Supply (UPS) which can provide several minutes worth of power (enough to save your work) in case of a failure. Most UPS units also function as a surge protector.

·        If you are living on campus, be sure to follow the guidelines provided by the Division of Housing in regards to extension cords and “power strips.” Never daisy chain surge protectors or UPS units – this practice easily overcomes the protection provided by these devices.

 Virus and Spy wares:

 The best way to avoid infecting your PC with these aliens is to block their source of entry into your PC. Usually, these aliens propagate through Pen Drives, Email, Illegal downloads, Torrents, and other means of data transfer such as CDs and DVDs.

 Basic security settings:

 ·        Use good anti-virus software, update it regularly and scan your system frequently. This does 25% of the work. Good anti-virus software with a real time scanning ability will detect most of the infection before it occurs, thereby saving you the trouble even before it erupts.

·        Update your Windows OS with all the security releases from Microsoft. This is pretty essential, but I haven’t seen many high-priority updates since SP2. So, if you have SP2, I guess that’s updated enough; but always update if you can.

·        Always watch the task manager. Be aware of the number of processes that your system usually runs. This could help you detect any unwanted processes running in the background.

·        Always scan any file that you download from the internet or your email inbox before executing it.

 
Internet:

 When using services on the Internet, you should always use common sense and keep in mind the following:

 ·        Never give information through an on-line form or “talk” session that you would not mind someone knowing. This includes WebPages linked to from emails. Many companies would like to know more about you; however you are not under any obligation to give them any information. The only exception to this rule is when you are making a purchase, and then the company will need information for the purchase and delivery of the product.

·        Only make purchases through known companies. If you want to make a purchase from an unknown company, take time to research the company. You can find out information from agencies that keep track of fraud and poor business practices. Many of these companies and agencies place information on-line. You can search the web for this information. Make small purchases from a company that you do not know before making a large purchase.

·        A mention about “cookies”. Cookies are files that contain information. This information is stored by the server (company) that you visit on the web. Cookies are necessary to use some web sites. Using cookies makes it possible for a server (company) to detect your web browsing habits. My suggestion for managing cookies is to set your browser to notify you before accepting a cookie. In this way, you can decide what cookies you will allow on your computer. Many web sites on the Internet use Java applets and JavaScript’s (small programs) to enhance the web browser presentation and user interaction. Special conditions have to exist for a Java applet or script to cause harm to your computer too.

·        Use a personal firewall to keep unwanted entities out of your computer.

·        Don’t open email attachment that you are not expecting to receive and scan all attachments with a virus scan program before opening or sending.

Microsoft Unveils New Silverlight 2 Beta

MS-SilverLite

New light on the company’s Silverlight 2 browser plug-in technology, a Microsoft official wrote a blog post today that emphasized RIA (rich Internet application) development capabilities planned for an upcoming beta release.

Microsoft’s Scott Guthrie, general manager in the Microsoft Developer Division, provided a list of features planned for Silverlight 2 and the beta in his blog. A Microsoft representative subsequently described the blog as the most detail provided to date on Silverlight 2.

With the Silverlight platform, Microsoft is expected to tackle Adobe and its popular Flash technology in the RIA space. Microsoft’s Mix08 conference in Las Vegas in two weeks seems like the obvious place to introduce the beta as Silverlight was the star attraction at the Mix07 conference last year. The Microsoft representative would not comment on whether this would actually be the case but did acknowledge plans to ship the beta during the first quarter of this year.

The introduction of Silverlight 2, which had previously been named Silverlight 1.1, is critical to Microsoft as it battles Adobe, an analyst stressed.

“That’s the one that uses the .Net Framework for programming so it can leverage all of Microsoft’s developer tools,” said analyst Rob Helm of Directions on Microsoft, an independent research firm. “Developer tools could become Microsoft’s secret weapon,” since many developers already are familiar with Visual Studio and .Net Framework, he said.

The 1.0 version of Silverlight has been more geared to video, while Silverlight 2 adds .Net development and transactional capabilities. To bolster RIA development, the Beta 1 release will include a Windows Presentation Foundation UI framework for building rich Web applications. It offers a “powerful” graphics and animation engine plus support for higher-level capabilities, such as controls, layout management, data-binding, and template skinning, Guthrie said.

source:pcworld

Microsoft Unveils Free SkyDrive Online Storage Service

Win-Sky

Microsoft on Friday quietly took the wraps off a free online storage service that it says is the final piece of its Windows Live Internet services portfolio.

Windows Live SkyDrive offers users up to 5 GB of free storage in password-protected servers. Users can also create folders accessible to friends, colleagues, or the general public. They can access their folders from any computer connected to the Internet by signing on to their Windows Live account.

SkyDrive had been undergoing testing for the past several months, Microsoft said.

Windows Live now offers a range of online services in addition to SkyDrive, including tools for e-mail, blogging, instant messaging, and social networking.

The effort is part of Microsoft’s attempt to keep pace with Google and acquisition target Yahoo in the growing Web services market.

Google recently launched its Google Apps service — a suite of hosted products that includes a word processor and a spreadsheet, as well as e-mail and calendaring tools. Yahoo also offers free e-mail and messaging services and an online storage depot called Briefcase that offers up to 25 MB of free space.

Windows Live also reflects Microsoft’s recognition that many of the software products that are today sold in boxes on store shelves are migrating to the Web. As a result, the company needs to figure out how to enhance its Web offerings without undercutting sales of its packaged applications, from which it derives the bulk of its revenue.

 source:informationweek

Google Health Records System; When It’s Going To Release?

G-health

Internet giant Google previously announced Google Health would open its doors in 2008, but the company hasn’t offered any information on expanding its pilot program.

Google has announced it has embarked on a pilot project with the Cleveland Clinic which will involve Google storing the medical records of between 1,500 and 10,000 patients. Participation will be voluntary—patients must consent to having their records handled by Google’s new service. The Cleveland Clinic already operates its own electronic records system called MyChart; however, the Google service will make medical records available to patients using the same passwords they can use to access Google’s other services, like GMail. The records will include details about prescriptions, medical conditions, allergies, and the like, the patients can allow physicians and others to access at their discretion.

“By using the GData protocol already offered in many Google products, and supporting standards-based medical information formats like the Continuity of Care Record (CCR), our health efforts will help you access, store and communicate your health information,” wrote Alan Newberger, an engineer on Google’s health team. “Above all, health data will remain yours—private and confidential. Only you have control over when to share it with family members and health providers.”

Google isn’t the only major computing company looking at health information: Microsoft announced its own HealthVault program late last year, aiming to provide health information as well as secure access to medical records.

 

source:digitaltrends

Google Scan Password Hunter Hacking Tool

G-hack-tool

The hacking group Cult of the Dead Cow (CDC) this week released a tool that turns Google into an automated vulnerability scanner, scouring websites for sensitive information such as passwords or server vulnerabilities.

CDC first achieved notoriety ten years ago with its backdoor Back Orifice, which demonstrated in a highly public way just how easy it was to take unauthorized control of a Windows PC.

The new tool, called Goolag Scan, is equally provocative, making it easy for unskilled users to track down vulnerabilities and sensitive information on specific websites or broad web domains.

This capability should serve as a wake-up call for system administrators to run the tool on their own sites before attackers get around to it, according to CDC.

The tool is a stand-alone Windows .Net application, licensed under the open source GNU General Public License, that provides about 1,500 customized searches under categories such as “vulnerable servers,” “sensitive online shopping information” and “files containing juicy information.”

The results are displayed as a list of links that can be opened directly in a browser. Example results include tell-tale error messages and Java applets for the remote control of surveillance cameras, according to CDC.

Goolag Scan is based on “Google hacking,” the practice of exposing vulnerabilities via Google, which CDC says has been pioneered by a hacker going by the handle “Johnny I Hack Stuff.”

Goolag Scan is, however, the first time such vulnerability searches have been built into a simple tool, according to CDC.

source:pcworld