email-subscribe Twitter-subscribe feedburner email-subscribe YouTube-subscribe

Subscribe

Sponsor

Fast and Furious 5–Trailer Brazil

You saw it here!



iOS Took a long history of upgrades, iTouch vs iPhone and T-Hub

The iOS from Apple runs on the iPhone, iTouch, iPad and not commonly realized the Apple Tv (GUI is different on Apple Tv), Since the initial release on the iPhone on June 29th 2007 it has taken upgrades to just about every aspect from the web browser to the latest update of multitasking and don’t forget the game center.

The iPhone 3G will not keep up well with the 4.0 update it will run with lag and poor quality thus the 3GS runs exceptionally well still though the downside of video calling essentially the` 3GS still runs great on the 4.2 update.

To the gadgets the iPhone 4 was a huge update for Apple it created a better device, the glass on the front is hardened and they added a layer of glass to the back, there was quite a lot of controversy over the glass on the back though I love it, the problem was the glass can scratch and crack if dropped so the key is here look after you’re your device and for the price my suggestion is to buy a case even if it’s a clear acrylic case then you can still show of your amazing new iPhone.

The iPod Touch had the upgrade of a slimmed town casing, front and rear facing camera’s,  and the A4 processor, the device has only 256MB of ram compared to the iPhone 4’s 512MB Ram, in comparison you can look at the iTouch and think it’s a perfect stripped down copy of the iPhone though one is a phone and one is an MP3 though under the chassis of glass, aluminum and plastic there components are very different.

The iPhone 4 contains touch screen IPS technology where as the iPod touch which does have a touch screen does not contain the IPS screen upgrade, the iPhone battery also lasts 5.25 Watts/Hour where as the iTouch 3.44 Watts/Hour.

ipod-touch-4-facetime-500x332Now there is one thing then at I think sets the iTouch too far from the iPhone and this piece of hardware is shocking to say that the iTouch only has a 0.7 megapixel camera even a cheap $70 mobile phone at least can have a 3 megapixel camera and considering the face time upgrade I would of thought at least 2 megapixel would be sufficient, now on the other hand the iPhone has a 5 megapixel camera.

The iPhone 4 defiantly wins on the specs but the iTouch wouldn’t be the same without these differences and the slimness and affordability of the device though that camera would be an excellent upgrade to the system.

I can’t wait to see where Apple goes with it’s devices, at the moment there is a lot going on with slates and the home phone system, currently I have a T-Hub on order this device is controversial at the moment due to issues with the software, though I shall do my own testing just to give you an idea of what this device contains it a touch screen display, Telstra's own applications, it contains access to Facebook, YouTube and the whole web, now this device is a home phone so it does contain a integrated microphone and loud inbuilt speakers.

telstra-t-hub_1I think Apple could take up this idea with an iPad similar home phone slate running the iOS, there are so many applications which the iOS along with Apple could revolutionize.

Thanks,

Lance Burrows



The most secure gadget in the cloud has to run on an iOS Device.

The Apple iPod, iPad and iPhone are all great devices and the reason there so widely loved is how great the device opens you to the cloud in a safe and secure manner, you will never have to worry about you device being at risk of security cracks, that is if you haven’t jail broken your device.

If your device is jail broken the only security risk is yourself you would be the one to install a broken app that bricks your device.

The i devices open you to the cloud with social networking and there great screen resolutions that make 360p YouTube videos look like full high definition, even gaming especially on the iPod and iPad is exceptionally good due to online play with games like Real Racing HD and Tap Tap Revenge you can have ours of secure fun for a minimal price.

You shouldn’t need to jail break your device due to most apps being under $6 and there are some great ones around for free as well.

Opening you to the cloud safely is one thing Apple has accomplished exceptionally with there app store, It’s locked out to the average developer until your app has been reviewed and bug tested to Apples app quality standards.

I think opening people to the cloud is efficient through socializing through Facebook and other social networks, Facetime was the next step from Apple not just to take the fame away from Skype but it was at great user advantage, It opened video calling to a wide selection of users you no longer needed an iPhone to make video calls, it enabled phone like features to the iTouch and made calling that much more fun and more practical and that’s what I believe Apple is all about with these devices, I theorize social networking in the next 10 years will dramatically change both in the general public but concerns of political privacy will be a player in this issue.

There are on going issues at the moment due to privacy and a lot of that has been shown with the WikiLeaks website that created government disturbance due to issues thought private and disturbing to the public.

 

Thanks,

Lance Burrows

Security on Google OS? Open to the cloud say’s Google.

Chromium is bearing it’s release, The chromium operating system based on Linux could find it’s way into the hacker world with more Virus’s, Malware and Trojans that could be what’s to come with the device open to the cloud as Google proposed the OS is focusing on moving your data online.

With the move to online the OS’s operating system is still based on Linux it is my forecast that if chromium starts to get shipped on Acer Netbooks in retail outlets then there is bound to be a spike in security risks for Linux.

Focusing on my last article I wrote how security of cloud networking could be a risk, on windows and mac there is antivirus software to prevent Trojans, Spyware, Malware and Virus’s in Linux there is few protection applications and if there is an increase in applications they wont come without bugs and worm holes that can be cracked.

Linux at this point hasn’t been really susceptible to security risks you haven’t had to worry about antivirus protection as it’s not too common to get security risks on Linux, and with many different OS’s from Ubuntu to Kubuntu running two different Desktops KDE and GNOME, there would have to be different types of virus’s to target the different systems then there could be really hardcore virus’s that attack the Linux Core root system, no matter if your running Ubuntu, Chromium or Slackware you will still be affected.

So are you really going to put your trust into the so called cloud when you risk the chance of a brewing storm which could end in more than a little bit of rain and thunder but a flood in your hard drive.

Thanks,

Lance Burrows

The Cloud open for all to upload BUT WHO IS DOWNLOADING?

Upload binary

Have you got into cloud storage yet?

You can upload your files online so you can access your content anywhere, but how safe is your content from theft and destruction, there is hackers and more importantly crackers out there that would do anything to get there hands on your content, It’s like a game how much the cracker can get there hands on it’s not about the file it’s about just getting there hands on it.

For the cracker and hacker the aim is to open a hole to your files, to crack through the security which usually isn’t very secure to gain access to your files.

You may not have to worry about your files being stolen but that isn’t the main issue, the main problem is what are you uploading and do you feel safe doing so.

Do you download movies illegally or music if you do you would have that thought running in the back of your head or maybe your arrogant enough to think that I cant be caught doing this it’s on my computer no ones standing behind me to see what I'm doing, no there not standing behind you more like in the PC box watching what your downloading and uploading yes it’s you ISP (Internet Service Provider) trying to stop copywrite theft, you may be careful to go through all the steps of setting up a VPN (virtual Private Network) and proxy server to try to hide and encrypt your download but when your uploading your open to the hole web.

There are legal files such as Linux OS’s to download and it’s usually quite quicker to use a torrent, most torrents are illegal though the opensource linux is a legal torrent, you would use an application like utorrent to download the file, you can see while downloading where you are uploading from, you can see the IP address of the user your downloading from.

It’s not to difficult to hack into a computer as long as you have it’s IP and port and because there is an incoming connection your open to being hacked .

For the most part your safe but what I’m saying is when you upload your data make sure it’s on a secure HTTPS service and try to stay clear from torrents for the most part.

Thanks,

Lance Burrows

Connect That External HDD Internally in your PC

western-digital-my-book-external-hard-drives1

Do you have and external HDD that you use primary to store your files such as your movies, music and games but it doesn’t tend to get disconnected from that USB 2.0 cable that runs to the pc?

 

You may run into the same problem I did where the power supply breaks and you have a drive sitting there with gigabytes of data on it you cant touch, well there is good news you can strip it out of its case though don’t get scared essentially its just an internal HDD in a case.

 

First open up the case, strip it out until there is just a PCB (printed circuit board) chip connected to the SATA and power pin connectors, just slide it off and then you have an internal HDD.

images

Now if you don’t have a spare SATA connection or a Power connection temporarily you can disconnect the DVD drive and plug its connectors in to the stripped HDD, you must disconnect the SATA cable from SATA 2 in most cases on the mother board and plug into a slave like ports 3 and 4 the last 2 ports.

07-sata_sb_done

x360_hdd_guide_7_lg

In most cases after this you should be set to boot the machine though if the machine doesn’t recognize the HDD then you may have to set a Jumper, On the HDD there is jumper pins next to the SATA and Power connectors you may have to put a jumped on to the slave connectors.

 

This process is very beneficial as you can go to the local technology store and pick up a 1TB external for around $100, that’s very cheap it can save money by buying it in an external case, then you may have a 200GB 3.5” HDD lying around you can always plug that in and have a spare 200GB backup drive.

 

Note that this process is done on a 3.5” and not a 2.5” HDD to use the slimmer 2.5” HDD you need an adapter they are very cheap and widely available online, I recommend looking on eBay.

Thanks,

Lance Burrows

I was right the Announcement of Alien life this morning that was found at Mono Lake

This Article is from (http://primewriter.com/news-1246-headlines/?p=11747)
– Giving full credit to the Author Chris Jenkins.

 

Mary Voytek, Director of the Astrobiology Program for NASA and Felisa Wolfe-Simon held a live press conference to discuss the incredible discovery of ‘weird life’ or ‘alien life’ that was recently made by Felisa Wolfe-Simon.

Felisa Wolfe-Simon said, “All life that we know requires carbon, hydrogen, nitrogen, oxygen, phosphorus and sulphur and it uses those six elements and some of the critical pieces I think we’re familiar with including DNA, RNA or the information technology, the protein which are the molecular machines and lipids, which separate you from everything else.”

She continued, “So by discovering, we discovered in our organism that can substitute one element for another in these bio-molecules. So I want to put that in the context of the who, what, where and how we did this and give us a little bit in an astrobiological context or life in a planetary context what this could mean to us on the practical and also a bit more esoteric levels.

I would like to introduce to you today the bacterium gfa-j1. These are not little pots to. They are microbes that scientists call bugs but they are not bugs. This is a bacterium that looks ordinary, this is a type of a micrograph that many of have seen but it’s doing something extraordinary.”

We’ll talk about that. But first, let’s find out where this microbe is from. You were looking at a map of Mono Lake, California. It’s in northern California and east of the Sierra, just outside of the Yosemite National Park. It’s a very interesting environment. We’ll take a look at that. Please roll that footage. Mono lake has three times the salt of sea water, a pitch of 10 is basic like bleach and it’s got very high levels of arsenic and teaming with life.

The seemingly inhospitable environment teams with life like bacteria and algae and is a major stopping point for migratory to birds on their way through the United States. We went to look for an interesting microbe and we went to an unusual place.

So let me tell you a little bit how we did this. If you want to look for an organism that can substitute one element for another you want to think where that is abundant. It’s abundant in mono lake. We think about the periodic table. Arsenic life just below phosphorous on the periodic table they have the physical size that’s very similar. Physical size of the atom.

Actually, the fact that this chemical similarity and other things that I would be happy they discuss at length with folks, but that chemical similarity lends insight into something that arsenic is toxic because it looks like phosphorus. So your cells and my cells and microbial cells, they can’t tell the difference. That’s very interesting to me as a biochemist.

So I went to look for this particular microbe. We took the mud from mono lake that we just we’re introduced to and wanted to see if anything would grow if we took that mud and gave it an laboratory environment that was rich in everything it need, sugar, vitamins, not that bad for us, and we added no phosphorous. This is not an experiment that most people might run, but it was driven by my question.

Is there a microbe on earth that could substitute arsenic for phosphorus and its basic bio-molecular constituents and so what did we find? We found that not only this microbe cope or ordeal with the toxicity of arsenic, but it grew and thrived. That was amazing. Nothing should have gone. Put your plant in the dark. It doesn’t grow. So something grew. Now we wanted to find what was happening. So we measured the insides of the cell, we took the cells and measured the total arsenic concentration. Then we found that the arsenic was associated specifically with a band of genomic DNA.

So it was associated. It was inside the cell. It’s like sitting at a dinner table with you and your neighbors and we might see how you’re around. Well, what should be in the place phosphorous? It looked like it was arsenic. We measured it as arsenic.

Let’s look at an artist rendition of what’s going on in that cell. Here we’re seeing the beautiful elegant structure of the double helix of the DNA and what I want to highlight is the phosphate. That’s the backbone we say and that’s the light orange ball and it stitches together as we see the edges of the DNA. It holds together the DNA, the backbone.

What we think is happening, all the evidence we collected suggests is that instead of these we’ll see these orange light orange balls disappear and represented by green balls we see that arsenic would be substituting for phosphorus and the backbone of the DNA. You can see how critical this component of the DNA might be.

So, what I’ve presented to you today is a microbe doing something different than life as we knew about it. I was taught all life we know on earth, all life we know of is here so far and if there’s an organism on earth doing something different we’ve cracked open the door to what’s possible for life elsewhere in the universe and that’s profound. And to understand how life is formed and where life is going.”

The discovery of bacteria thriving in arsenic and not in phosphorous is so monumental it will possibly rewrite science text books. It shows that with all of our technology, learning, understanding and wisdom there are many areas where centuries from now, we could be described as living in a certain ‘dark ages’ if you will. Life as we know it, is no longer the rule and the discovery not only shows how much about our universe and planet there is to discover, but the importance of having funding to make these discoveries possible.

Mary Voytek stated, “This research was funded by the Astrobiology program, which is the research and analysis program in NASA that focuses on the origin and evolution of life, the distribution of life and future of life on earth to inform us as to how we might search for life and evidence of life in other places in our solar system.

NASA has had a long history of funding origin of life research. In fact, we’re celebrating our 50th anniversary this year. The research that’s going to be presented here today shows the goals of our program and our interest in the origin of life and life in the universe.”

The importance of NASA funding couldn’t be more evidenced than by today’s incredible announcement. Let’s hope that should aliens come to Earth or attempt to make human contact NASA will have the funding in place as well as the tools and equipment needed to find them.