Asus Eee PC 2G Surf
Image courtesy of Reviewheaven.net
Specifications
Asus has always promoted the Eee netbook series to be easy to work, easy to learn and easy to play. It has 10/100 Ethernet and 802.11b/g wireless. It comes with a VGA port and an SD Card Slot that supports SDHC. The Celeron-M 800 MHz operates at 571 MHz. System memory of this Eee netbook is at 512MB. There's a flash memory reader slot whereby users can use an SD memory card to write or read. This netbook comes with a 4400 mAh 4-cell unit that can last for about 2.5 hours. The battery can be upgraded to a 5600 mAh which can last for about 3.5 hours.........
Barrier to faster integrated circuits
College Park, MD (June 29, 2010) -- Integrated circuits, which enable virtually every electronics gadget you use on a daily basis, are constantly being pushed by the semiconductor industry to become smaller, faster, and cheaper. As has happened a number of times in the past and will continue in the future, integrated circuit scaling is perpetually in danger of hitting a wall that must be maneuvered around.As per Maxime Darnon, a researcher at the French National Center for Scientific Research, in order to continue increasing the speed of integrated circuits, interconnect insulators will require an upgrade to porous, low-dielectric constant materials. Darnon and his colleagues discuss the details in the Journal of Applied Physics, which is published by the American Institute of Physics (AIP).
"The integration of a replacement, porous SiCOH (pSiCOH), however, poses serious problems such as an unacceptable 'roughening' that occurs during plasma processing," explains Darnon. "This is considered a 'showstopper' to faster integrated circuits at the moment, so a fundamental understanding of the roughening mechanisms that occur during the etch process of integrated circuit manufacturing is highly desirable to material designers and etch-process engineers.
Darnon's research team proposes a mechanism for the roughening of pSiCOH materials etched in a fluorocarbon-based plasma. They've shown that the problematic roughness results from a cracking of the denser top surface under ion bombardment, and that this roughness propagates through a slower etching of the dense top surface than the modified porous material beneath it. Perhaps more importantly, the team recommends ways to minimize this phenomenon so that the "showstopper" will only be a speedbump on the road to faster integrated circuits.........
How laptops can enhance learning
Despite the distraction potential of laptops in college classrooms, new research shows that they can actually increase students' engagement, attentiveness, participation and learning.To achieve this, however, the instructor must set the right stage, says University of Michigan professor Perry Samson.
Samson is a professor in the Department of Atmospheric, Oceanic and Space Sciences who has received honors for his educational technology work.
He has developed robust interactive student response system called LectureTools that utilizes students' laptops. A paper about how students report that LectureTools affected their learning is reported in the May edition of the journal Computers & Education.
"If you allow laptops in the classroom without a plan for how you'll use them, you can potentially invite disaster. It's unlikely that students will be so entranced by class material that they won't wander off to their favorite social networking sites," Samson said. "The key is to deliberately engage students through their computers. LectureTools does just that".
LectureTools is an interactive student response system and teaching module. Instructors at more than 400 colleges and universities have set up accounts to use it.
Samson recently surveyed close to 200 students who, over the past three semesters, have taken his Extreme Weather lecture course that utilized LectureTools. Students reported that while they did sometimes stray from in-class tasks, laptops with LectureTools made them feel more attentive, engaged and able to learn, compared with classes that don't use the system.........
Recover Lost Hard Drive Data
Here's the latest free hard drive data recovery program to be offered, and as always I advise you to maintain separate, removable media, to back up your precious digital photo files.Of course the use of removable media for backup extends beyond your photo files and should include all files that you consider "must haves."
The "iCare", "Data Recovery 3.6" Software, is a bit more advanced than some past free offerings and deserves a look, especially since it's free.
Besides the usual data loss recovery feature "iCare's", "Data Recovery 3.6" Software allows you to recover deleted hard drive partitions, perform "deep scan recoveries" and "format recoveries."
Get your free iCare Data Recovery 3.6 Software before the offer is rescinded at midnight tonight.
Take a camera with you whenever possible, and look around, you'll find a picture somewhere.
Photo Source: www.giveawayoftheday.com
Back to the future for computers
A presentation at the Optical Fiber Communication Conference and Exposition/National Fiber Optic Engineers Conference (OFC/NFOEC) in San Diego on March 24 will examine the technologies that will emerge in the next three to four years to power warehouse-scale computing data centers, upon which companies such as Google, Amazon, Microsoft, Yahoo, Facebook, and a number of more are increasingly relying.The advent of distributed, massive-scale "cloud computing" today is something of a return to the early part of 1980s, when computing was of a different sort. Rather than individual desktop or laptop machines, which are the current norm, computers were commonly time-shared among multiple users working on "dumb" terminals connected to a central machineoften located in some remote corner of the building.
Cloud computing basically makes use of the Internet to connect remote users to massive, warehouse-scale data centers that house large networks of processors and memory for crunching and storing data. These warehouse data centers promise to lower computing costs by sharing resources and taking advantage of economies of scale, says Network Architect Cedric Lam of Google, and they will relieve users of the hassles of maintaining and upgrading equipment and backing up their data.........
World's first multitouch gaming laptop
The Battalion Touch Notebook is apparently the world’s first multi-touch gaming laptop computer. The rest of the spec seems fairly standard for a 15.6 inch laptop, so we’re wondering exactly what market really wants to swap the lean back ease of use you get with a mouse and keyboard for the hunched over finger stretching hassle that comes with multi-touch screen technology?Sure it’s cool for mobile phones, but a notebook computer? Really? Anyhoo, those of you with an urge to smear your screens while scrolling down the eBay listings go ahead, knock yourself out. Cough up $999.00 first please.
Experience a new dimension of interactive gaming, media organization, and content creation with the Battalion Touch series. Featuring a full multi-touch screen, the Battalion Touch series allows you to interact with your system in new ways and take full advantage of the built-in multi-touch capabilities of Windows 7. With the growing popularity of the multi-touch interactive platform, the Battalion Touch series provides the capabilities to support the increasing number of multi-touch optimized game and software titles.
Moving Video to "Captcha" Robot Hackers
We see the popular "captcha" security mechanism often - wavy letters websites ask us to type into a box. It's used by web pages and newsletter sign-up forms to prevent computer robots from hacking into servers and databases. But these codes, which are becoming increasingly complicated for an average person to use, are not immune to security holes.A research project led by Prof. Danny Cohen-Or of Tel Aviv University's Blavatnik School of Computer Sciences demonstrates how a new kind of video captcha code appears to be harder to outsmart. The foundation of the work, presented at a recent SIGGRAPH conference, is really pure research, says Prof. Cohen-Or, but it opens the door so security scientists can think a little differently.
"Humans have a very special skill that computer bots have still not been able to master," says Prof. Cohen-Or. "We can see what's called an 'emergence image' - an object on a computer screen that becomes recognizable only when it's moving - and identify this image in a matter of seconds. While a person can't 'see' the image as a stationary object on a mottled background, it becomes part of our gestalt as it moves, allowing us to recognize and process it".
A truly "emerging" technology
In the new research paper, co-authored with colleagues in Taiwan, Saudi Arabia and India, Prof. Cohen-Or describes a synthesis technique that generates pictures of 3-D objects, like a running man or a flying airplane. This technique, he says, will allow security developers to generate an infinite number of moving "emergence" images that will be virtually impossible for any computer algorithm to decode.........
Do computers understand art?
This a painting of a seated woman with bent knee by Egon Schiele (1917).
Credit: Egon Schiele
Credit: Egon Schiele
How does one place an artwork in a particular artistic period? This is the question raised by researchers from the Laboratory of Graphics and Image in the University of Girona and the Max Planck Institute for Biological Cybernetics, in Gera number of. The scientists have shown that certain artificial vision algorithms mean a computer can be programmed to "understand" an image and differentiate between artistic styles based on low-level pictorial information. Human classification strategies, however, include medium and high-level concepts.
Low-level pictorial information encompasses aspects such as brush thickness, the type of material and the composition of the palette of colours. Medium-level information differentiates between certain objects and scenes appearing in a picture, as well as the type of painting (landscape, portrait, still life, etc.). High-level information takes into account the historical context and knowledge of the artists and artistic trends.........
How to Make Your Computer Live Longer
©psdSometime I think losing a laptop is almost as traumatic as losing a pet. You spend so much time and effort getting to know what it, trying new things. You waste hours of your life playing with it. It even follows you around.
Okay, so I might be pushing the analogy, but the truth is, most of us don"t have the money to get a new laptop every 6 months. We"d like to keep the one we have alive and running for as long as possible.
So here are a few useful little tips that might extend the life your computer. Don"t worry, you probably already know them, but reminders never hurt anyone:
1. Shut it Down: This may sound simple but many of us just close the lid, turn of the monitor or set it to sleep mode. Completely shutting your computer down will keep it from overheating and leaking memory. Think of your computer like your brain, it can"t function without a good night"s sleep.
2. Defrag!: Again, another simple "duh" moment. Defrag your computer. Most PCs will even let you set up a regular defrag schedule once a week. Cleaning up your files on a regular basis will also keep your computer functioning at optimal speed.
3. Keep it Clean: During your regularly scheduled defrag, go ahead and run a scan for viruses, spyware, malware, all that bad stuff you can pick on the internet. Find a good program to keep your PC"s health good.
4. Don"t Drop It: Look, be nice to your laptops. Keep them in safe places, don"t expose them to weird temperatures and be sure not to eat or drink near them if possible. Also pets. I lost a laptop a few years ago to a cat pouncing on and then hairballing all over my keys, it broke my screen and something gross seeped into the circuitry. Trust me, helping your computer and your pets avoid each other is a good idea.
These might not be the most enlightening tips, but they"ll go along way in keeping your computer chugging along for an extra year or so.
Do you have tips for adding an extra life to your laptop?
How to get a cool laptop
Does your laptop sometimes get so hot that it can almost be used to fry eggs? New technology may help cool it and give information technology a unique twist, says Jairo Sinova, a Texas A&M University physics professor.Sinova and his colleagues from Hitachi Cambridge Laboratory, Institute of Physics ASCR, University of Cambridge and University of Nottingham have had their research reported in the renowned journal Nature Physics.
Laptops are getting increasingly powerful, but as their sizes are getting smaller they are heating up, so how to deal with excessive heat becomes a headache, Sinova explains.
"The crux of the problem is the way information is processed," Sinova notes. "Laptops and some other devices use flows of electric charge to process information, but they also produce heat.
"Theoretically, excessive heat may melt the laptop," he adds. "This also wastes a considerable amount of energy".
Is there a solution?
One approach appears to be found in Sinova's research - an alternative way to process information.
"Our research looks at the spin of electrons, tiny particles that naked eyes cannot detect," the Texas A&M professor explains. "The directions they spin can be used to record and process information".........
Use computer security guide to protect
Just in time for October's Cyber Security Awareness Month, the National Institute of Standards and Technology (NIST) has published a guide to help small businesses and organizations understand how to provide basic security for their information, systems and networks. NIST has also created a video that explores the reasons small businesses need to secure their data (at right).The guide, Small Business Information Security: The Fundamentals, was authored by Richard Kissel, who spends much of his time on the road teaching computer security to groups of small business owners ranging from tow truck operators to managers of hospitals, small manufacturers and nonprofit organizations. The 20-page guide uses simple and clear language to walk small business owners through the important steps necessary to secure their computer systems and data.
Small businesses make up more than 95 percent of the nation's businesses, are responsible for about 50 percent of the Gross National Product and create about 50 percent of the country's new jobs, as per a 2009 Small Business Administration report. Yet these organizations rarely have the information technology resources to protect their sensitive information that larger corporations do.
Consequently, they could be seen as easy marks by hackers and cyber criminals, who could easily focus more of their unwanted attention on small businesses. And just like big companies, the computers at small businesses hold sensitive information on customers, employees and business partners that needs to be guarded, Kissel says. He adds that regulatory agencies have requirements to protect some health, financial and other information.........
Ants vs. worms
Computer science professor Errin Fulp works with graduate students Brian Williams (center) and Wes Featherstun (far right), who worked this summer at Pacific Northwest National Laboratory developing a new type of computer network security software modeled after ants.
Unlike traditional security devices, which are static, these "digital ants" wander through computer networks looking for threats, such as "computer worms" - self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn't take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate.
The concept, called "swarm intelligence," promises to transform cyber security because it adapts readily to changing threats.
"In nature, we know that ants defend against threats very successfully," explains Professor of Computer Science Errin Fulp, an expert in security and computer networks. "They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system".
Current security devices are designed to defend against all known threats at all times, but the bad guys who write malware - software created for malicious purposes - keep introducing slight variations to evade computer defenses.........
Rome was built in a day
University of Washington
The Colosseum as seen in the digital reconstruction. Each triangle is where a person was standing when he or she took a photo. The building's shape is determined by analyzing photos taken from all these different perspectives.
The Colosseum as seen in the digital reconstruction. Each triangle is where a person was standing when he or she took a photo. The building's shape is determined by analyzing photos taken from all these different perspectives.
A new computer algorithm developed at the University of Washington uses hundreds of thousands of tourist photos to automatically reconstruct an entire city in about a day.
The tool is the most recent in a series developed at the UW to harness the increasingly large digital photo collections available on photo-sharing Web sites. The digital Rome was built from 150,000 tourist photos tagged with the word "Rome" or "Roma" that were downloaded from the popular photo-sharing Web site, Flickr.
Computers analyzed each image and in 21 hours combined them to create a 3-D digital model. With this model a viewer can fly around Rome's landmarks, from the Trevi Fountain to the Pantheon to the inside of the Sistine Chapel.
"How to match these massive collections of images to each other was a challenge," said Sameer Agarwal, a UW acting assistant professor of computer science and engineering and main author of a paper being presented in October at the International Conference on Computer Vision in Kyoto, Japan. Until now, he said, "even if we had all the hardware we could get our hands on and then some, a reconstruction using this a number of photos would take forever."........
Trash or treasure?
More computers discarded by consumers in the United States are getting a second life in developing countries than previously believed, as per a newly released study the most comprehensive ever done on the topic reported in ACS' semi-monthly journalEnvironmental Science & Technology The findings may ease growing concerns about environmental pollution with toxic metals that can result from dismantling and recycling computer components in developing countries.In the study Ramzy Kahhat and Eric Williams focused on the situation in Peru, where Kahhat was born. They used a Peruvian government database that tracks importation of new and used computers and computing equipment. The scientists observed that at least 85 percent of computers imported into Peru are reused, rather than going directly into recycling.
The finding challenges the widespread belief that the trade in e-waste was mainly about dumping unusable junk or recycling components is inaccurate, at least for Peru. The U.S. is the source of up to 76 percent of used computers imported to Peru from 2003-2007, the scientists indicated. They note uncertainty on whether the same holds true for other, much larger countries like China and India.........
This article will self-destruct
University of Washington
Lead author Roxana Geambasu, a UW doctoral student, and undergraduate student Amit Levy helped create Vanish.
Lead author Roxana Geambasu, a UW doctoral student, and undergraduate student Amit Levy helped create Vanish.
The University of Washington has developed a way to make such information expire. After a set time period, electronic communications such as e-mail, Facebook posts and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites and home computers. Not even the sender could retrieve them.
"If you care about privacy, the Internet today is a very scary place," said UW computer scientist Tadayoshi Kohno. "If people understood the implications of where and how their e-mail is stored, they might be more careful or not use it as often."
The team of UW computer researchers developed a prototype system called Vanish that can place a time limit on text uploaded to any Web service through a Web browser. After a set time text written using Vanish will, in essence, self-destruct. A paper about the project went public today and will be presented at the Usenix Security Symposium Aug. 10-14 in Montreal.........
Computer-related injuries
While back pain, blurred vision and mouse-related injuries are now well-documented hazards of long-term computer use, the number of acute injuries connected to computers is rising rapidly. According to a study published in the July 2009 issue of theAmerican Journal of Preventive Medicine, researchers from the Center for Injury Research and Policy and The Research Institute at Nationwide Children's Hospital; and The Ohio State University College of Medicine, Columbus have found a more-than-sevenfold increase in computer-related injuries due to tripping over computer equipment, head injuries due to computer monitor falls and other physical incidents.According to data from the National Electronic Injury Surveillance System database, over 78,000 cases of acute computer-related injuries were treated in U.S. emergency departments from 1994 through 2006. Approximately 93% of injuries occurred at home. The number of acute computer-related injuries increased by 732% over the 13-year study period, which is more than double the increase in household computer ownership (309%).
Injury mechanisms included hitting against or catching on computer equipment; tripping or falling over computer equipment; computer equipment falling on top of the patient; and the straining of muscles or joints. The computer part most often associated with injuries was the monitor. The percentage of monitor-related cases increased significantly, from 11.6% in 1994 to a peak of 37.1% in 2003. By 2006, it had decreased to 25.1%. The decrease since 2003 corresponds to the replacement of heavier cathode ray tube (CRT) monitors with smaller and easier-to-lift liquid crystal display (LCD) monitors.........
Computer graphics researchers simulate the sounds of water
Provided/Doug James
The sounds produced by pouring and splashing water actually result from the vibration of trapped air bubbles. Cornell researchers can simulate those sounds by computing how the bubbles would behave.
The sounds produced by pouring and splashing water actually result from the vibration of trapped air bubbles. Cornell researchers can simulate those sounds by computing how the bubbles would behave.
Those are some of the sounds that have been missing from computer graphic simulations of water and other fluids, as per scientists in Cornell's Department of Computer Science, who have come up with new algorithms to simulate such sounds to go with the images.
The work by Doug James, associate professor of computer science, and graduate student Changxi Zheng will be reported at the 2009 ACM SIGGRAPH conference Aug. 3-7 in New Orleans. It is the first step in a broader research program on sound synthesis supported by a $1.2 million grant from the Human Centered Computing Program of the National Science Foundation (NSF) to James, assistant professor Kavita Bala and associate professor Steve Marschner.
In computer-animated movies, sound can be added after the fact from recordings or by Foley artists. But as virtual worlds grow increasingly interactive and immersive, the scientists point out, sounds will need to be generated automatically to fit events that can't be predicted in advance. Recordings can be cued in, but can be repetitive and not always well matched to what's happening.
"We have no way to efficiently compute the sounds of water splashing, paper crumpling, hands clapping, wind in trees or a wine glass dropped onto the floor," the scientists said in their research proposal.........
'Lab on a Tube' Monitoring Device
The need for improved monitoring of neurotrauma patients has resulted in the development of a prototype of a novel, multitasking "lab on a tube" at the University of Cincinnati (UC).UC engineers, working to fill a need expressed by physicians at the Neurotrauma Center at the UC Neuroscience Institute, have developed a preliminary working model of the multimodal tube, or "smart sensor," which is capable of continuously monitoring multiple physiological parameters in patients. The tube also is capable of draining excess cerebrospinal fluid from the injured brain and could be used to deliver medications to the patient.
Eventhough the monitoring device is still not ready for testing in humans, UC scientists hailed it as "a groundbreaking start".
Raj Narayan, MD, chairman and Frank Mayfield professor in the department of neurosurgery and the project's principal investigator, and Lori Shutter, MD, director of neurocritical care, expressed the need for a multimodality monitoring device for neurotrauma patients and participated in its design and creation.
The prototype for a smart neuro-catheter was then engineered by Chunyan Li, PhD, a postdoctoral fellow in the UC department of neurosurgery who trained under Chong Ahn, PhD, professor in the department of electrical and computer engineering. Concepts for a "lab on a tube" device with multimodality sensors were developed in the Microsystems and BioMEMS Laboratory headed by Ahn.........
eBay and looting of antiquities
Having worked for 25 years at fragile archaeological sites in Peru, UCLA archaeologist Charles "Chip" Stanish held his breath when the online auction house eBay launched more than a decade ago."My greatest fear was that the Internet would democratize antiquities trafficking, which previously had been a wealthy person's vice, and lead to widespread looting," said the UCLA professor of anthropology, who directs the UCLA Cotsen Institute of Archaeology.
Indeed, eBay has drastically altered the transporting and selling of illegal artifacts, Stanish writes in an article in the May/recent issue of Archaeology, but not in the way he and other archaeologists had feared.
By improving access to a worldwide market, eBay has inadvertently created a vast market for copies of antiquities, diverting whole villages from looting to producing fake artifacts, Stanish writes. The proliferation of these copies also has added new risks to buying objects billed as artifacts, which in turn has worked to depress the market for these items, further reducing incentives to loot.
"For most of us, the Web has forever distorted the antiquities trafficking market in a positive way," Stanish said.
Looting, which is illegal, is widely recognized as destructive to cultural heritage because it can remove from public ownership tangible links to a people's past. In addition, looting is perceived as the enemy of scholarship because it typically is done without regard to any appropriate methods that allow researchers to date objects and to place them in a larger, more meaningful context.........