Face detection technology on digital cameras :
A new breed of digital cameras was introduced earlier this year that are claimed to actually see a face in a scene, lock focus on it and adjust flash output and exposure so it comes out great. But does it really work as claimed? Veteran photo industry writer Jason Schneider takes new cameras with this feature into the field and reports on the results in an exclusive AIRC - Adorama Imaging Resource Center article, "Does Face Detection Technology Really Work?" "Conventional autofocus (AF) systems, even those with multiple AF zones, will sometimes miss the faces and focus on something else that's between them, farther away or closer, which results in out-of-focus pictures," notes Schneider.
Face detection technology
Schneider added: "Face Detection technology uses special algorithms that can detect typical face patterns in an image then adjust focus and exposure. It's an ingenious solution." In the article, Schneider shows examples of when Face Detection technology works - and when it doesn't. "For 40 years Jason Schneider tested and reviewed cameras for the two top photo magazines in the world, and his expertise in what goes on inside a camera is immense," notes AIRC editor Mason Resnick. "When he applies his analytical skills to the latest technology, such as Face Recognition, it's worth paying attention."
Thursday, December 24, 2009
Wednesday, December 16, 2009
All run commans for windows XP
A
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
ATTRIB Change file attributes
B
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
C
CACLS Change file permissions
CALL Call one batch program from another•
CD Change Directory - move to a specific Folder•
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen•
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window•
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
D
DATE Display or set the date•
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
DSRM Remove items from Active Directory
E
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EVENTCREATE Add a message to the Windows event log
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
F
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations•
G
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
GPUPDATE Update Group Policy settings
H
HELP Online Help
I
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
K
KILL Remove a program from memory
L
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer
LOGOFF Log a user off
LOGTIME Log the date and time in a file
M
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
N
NET Manage network resources
NETDOM Domain Manager
NETSH Configure Network Interfaces, Windows Firewall & Remote access
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
P
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD•
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
Q
QGREP Search file(s) for lines that match a given pattern.
R
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
S
SC Service Control
SCHTASKS Schedule a command to run at a specific time
SCLIST Display NT Services
SET Display, set, or remove environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables permanently
SFC System File Checker
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
T
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file•
U
USRSTAT List domain usernames and last login
V
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
W
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
X
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark•
WINDOS RUN Commands, Microsoft Help pages: Windows XP - 2003 Server - 2008 Server
Discussion forum
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
ATTRIB Change file attributes
B
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
C
CACLS Change file permissions
CALL Call one batch program from another•
CD Change Directory - move to a specific Folder•
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen•
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window•
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
D
DATE Display or set the date•
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
DSRM Remove items from Active Directory
E
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EVENTCREATE Add a message to the Windows event log
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
F
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations•
G
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
GPUPDATE Update Group Policy settings
H
HELP Online Help
I
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
K
KILL Remove a program from memory
L
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer
LOGOFF Log a user off
LOGTIME Log the date and time in a file
M
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
N
NET Manage network resources
NETDOM Domain Manager
NETSH Configure Network Interfaces, Windows Firewall & Remote access
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
P
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD•
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
Q
QGREP Search file(s) for lines that match a given pattern.
R
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
S
SC Service Control
SCHTASKS Schedule a command to run at a specific time
SCLIST Display NT Services
SET Display, set, or remove environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables permanently
SFC System File Checker
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
T
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file•
U
USRSTAT List domain usernames and last login
V
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
W
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
X
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark•
WINDOS RUN Commands, Microsoft Help pages: Windows XP - 2003 Server - 2008 Server
Discussion forum
Tuesday, December 8, 2009
shortcut keys for windows xp
Ctrl + A Select all contents of the page. Ctrl + B Bold highlighted selection. Ctrl + C Copy selected text. Ctrl + E Aligns the line or selected text to the center of the screen.
Ctrl + F Open find box. Ctrl + I Italic highlighted selection. Ctrl + J Aligns the selected text or line to justify the screen. Ctrl + K Insert link.
Ctrl + L Aligns the line or selected text to the left of the screen.
Ctrl + M Indent the paragraph.
Ctrl + P Open the print window.
Ctrl + R Aligns the line or selected text to the right of the screen.
Ctrl + T Create a hanging indent.
Ctrl + U Underline highlighted selection.
Ctrl + V Paste.
Ctrl + X Cut selected text.
Ctrl + Y Redo the last action performed.
Ctrl + Z Undo last action.
Ctrl + Shift + F Change the font.
Ctrl + Shift + > Increase selected font +1pts up to 12pt and then increases font +2pts.
Ctrl + ] Increase selected font +1pts.
Ctrl + Shift + < Decrease selected font -1pts if 12pt or lower, if above 12 decreases font by +2pt.
Ctrl + [ Decrease selected font -1pts.
Ctrl + Shift + * View or hide non printing characters.
Ctrl + Moves one word to the left.
Ctrl + Moves one word to the right.
Ctrl + Moves to the beginning of the line or paragraph.
Ctrl + Moves to the end of the paragraph.
Ctrl + Del Deletes word to right of cursor.
Ctrl + Backspace Deletes word to left of cursor.
Ctrl + End Moves the cursor to the end of the document.
Ctrl + Home Moves the cursor to the beginning of the document.
Ctrl + Spacebar Reset highlighted text to the default font.
Ctrl + 1 Single-space lines.
Ctrl + 2 Double-space lines.
Ctrl + 5 1.5-line spacing.
Ctrl + Alt + 1 Changes text to heading 1.
Ctrl + Alt + 2 Changes text to heading 2.
Ctrl + Alt + 3 Changes text to heading 3.
Ctrl + F1 Open the Task Pane.
F1 Open Help.
Alt + Ctrl + F2 Open new document.
Ctrl + F2 Display the print preview.
Shift + F3 Change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word. Shift + Insert Paste.
F4 Repeat the last action performed (Word 2000+)
F5 Open the find, replace, and go to window in Microsoft Word.
Ctrl + Shift + F6 Opens to another open Microsoft Word document.
F7 Spell and grammar check selected text and/or document.
Shift + F7 Runs a Thesaurus check on the word highlighted.
F12 Save as.
Shift + F12 Save.
Ctrl + Shift + F12 Prints the document.
Alt + Shift + D Insert the current date.
Alt + Shift + T Insert the current time.
In addition to the above shortcut keys users can also use their mouse as a method of quickly do something commonly performed. Below some are examples of mouse shortcuts.
Mouse shortcuts Description
Click, hold, and drag Selects text from where you click and hold to the point you drag and let go.
Double-click If double-click a word, selects the complete word.
Double-click Double-clicking on the left, center, or right of a blank line will make the alignment of the text left, center, or right aligned.
Double-click Double-clicking anywhere after text on a line will set a tab stop.
Triple-click Selects the line or paragraph of the text the mouse triple-clicked.
Ctrl + Mouse wheel Zooms in and out of document.
Ctrl + F Open find box. Ctrl + I Italic highlighted selection. Ctrl + J Aligns the selected text or line to justify the screen. Ctrl + K Insert link.
Ctrl + L Aligns the line or selected text to the left of the screen.
Ctrl + M Indent the paragraph.
Ctrl + P Open the print window.
Ctrl + R Aligns the line or selected text to the right of the screen.
Ctrl + T Create a hanging indent.
Ctrl + U Underline highlighted selection.
Ctrl + V Paste.
Ctrl + X Cut selected text.
Ctrl + Y Redo the last action performed.
Ctrl + Z Undo last action.
Ctrl + Shift + F Change the font.
Ctrl + Shift + > Increase selected font +1pts up to 12pt and then increases font +2pts.
Ctrl + ] Increase selected font +1pts.
Ctrl + Shift + < Decrease selected font -1pts if 12pt or lower, if above 12 decreases font by +2pt.
Ctrl + [ Decrease selected font -1pts.
Ctrl + Shift + * View or hide non printing characters.
Ctrl +
Ctrl +
Ctrl +
Ctrl +
Ctrl + Del Deletes word to right of cursor.
Ctrl + Backspace Deletes word to left of cursor.
Ctrl + End Moves the cursor to the end of the document.
Ctrl + Home Moves the cursor to the beginning of the document.
Ctrl + Spacebar Reset highlighted text to the default font.
Ctrl + 1 Single-space lines.
Ctrl + 2 Double-space lines.
Ctrl + 5 1.5-line spacing.
Ctrl + Alt + 1 Changes text to heading 1.
Ctrl + Alt + 2 Changes text to heading 2.
Ctrl + Alt + 3 Changes text to heading 3.
Ctrl + F1 Open the Task Pane.
F1 Open Help.
Alt + Ctrl + F2 Open new document.
Ctrl + F2 Display the print preview.
Shift + F3 Change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word. Shift + Insert Paste.
F4 Repeat the last action performed (Word 2000+)
F5 Open the find, replace, and go to window in Microsoft Word.
Ctrl + Shift + F6 Opens to another open Microsoft Word document.
F7 Spell and grammar check selected text and/or document.
Shift + F7 Runs a Thesaurus check on the word highlighted.
F12 Save as.
Shift + F12 Save.
Ctrl + Shift + F12 Prints the document.
Alt + Shift + D Insert the current date.
Alt + Shift + T Insert the current time.
In addition to the above shortcut keys users can also use their mouse as a method of quickly do something commonly performed. Below some are examples of mouse shortcuts.
Mouse shortcuts Description
Click, hold, and drag Selects text from where you click and hold to the point you drag and let go.
Double-click If double-click a word, selects the complete word.
Double-click Double-clicking on the left, center, or right of a blank line will make the alignment of the text left, center, or right aligned.
Double-click Double-clicking anywhere after text on a line will set a tab stop.
Triple-click Selects the line or paragraph of the text the mouse triple-clicked.
Ctrl + Mouse wheel Zooms in and out of document.
Friday, October 23, 2009
SIXTH SENSE TECHNOLOGY
Basically, Sixth Sense is a mini-projector coupled with a camera and a cellphone—which acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report.
However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magic—and a lot more—everywhere, even while you are jumping hysteric over Oprah's sofa.
The camera recognizes objects around you instantly, with the micro-projector overlaying the information on any surface, including the object itself or your hand. Then, you can access or manipulate the information using your fingers. Need to make a call? Extend your hand on front of the projector and numbers will appear for you to click. Need to know the time? Draw a circle on your wrist and a watch will appear. Want to take a photo? Just make a square with your fingers, highlighting what you want to frame, and the system will make the photo—which you can later organize with the others using your own hands over the air.
But those are just novelty applications. The true power of Sixth Sense lies on its potential to connect the real world with the Internet, and overlaying the information on the world itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or maybe what wine you should get for tonight's dinner. Just look at objects, hold them on your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences or not.
Now take this to every aspect of your everyday life. You can be in a taxi going to the airport, and just by taking out your boarding pass, Sixth Sense will grab real time information about your flight and display it over the ticket. You won't need to do any action. Just hold it in front of your and it will work.
The key here is that Sixth Sense recognizes the objects around you, displaying information automatically and letting you access it in any way you want, in the simplest way possible.
Clearly, this has the potential of becoming the ultimate "transparent" user interface for accessing information about everything around us. If they can get rid of the colored finger caps and it ever goes beyond the initial development phase, that is. But as it is now, it may change the way we interact with the real world and truly give everyone complete awareness of the environment around us.
Or just make a few people look like dorks. It can go either way, really. Whatever it is, I want to try it. [TED]
Send an email to Jesus Diaz, the author of this post, at jesus@gizmodo.com.
However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magic—and a lot more—everywhere, even while you are jumping hysteric over Oprah's sofa.
The camera recognizes objects around you instantly, with the micro-projector overlaying the information on any surface, including the object itself or your hand. Then, you can access or manipulate the information using your fingers. Need to make a call? Extend your hand on front of the projector and numbers will appear for you to click. Need to know the time? Draw a circle on your wrist and a watch will appear. Want to take a photo? Just make a square with your fingers, highlighting what you want to frame, and the system will make the photo—which you can later organize with the others using your own hands over the air.
But those are just novelty applications. The true power of Sixth Sense lies on its potential to connect the real world with the Internet, and overlaying the information on the world itself. Imagine you are at the supermarket, thinking about what brand of soap is better. Or maybe what wine you should get for tonight's dinner. Just look at objects, hold them on your hands, and Sixth Sense will show you if it's good or bad, or if it fits your preferences or not.
Now take this to every aspect of your everyday life. You can be in a taxi going to the airport, and just by taking out your boarding pass, Sixth Sense will grab real time information about your flight and display it over the ticket. You won't need to do any action. Just hold it in front of your and it will work.
The key here is that Sixth Sense recognizes the objects around you, displaying information automatically and letting you access it in any way you want, in the simplest way possible.
Clearly, this has the potential of becoming the ultimate "transparent" user interface for accessing information about everything around us. If they can get rid of the colored finger caps and it ever goes beyond the initial development phase, that is. But as it is now, it may change the way we interact with the real world and truly give everyone complete awareness of the environment around us.
Or just make a few people look like dorks. It can go either way, really. Whatever it is, I want to try it. [TED]
Send an email to Jesus Diaz, the author of this post, at jesus@gizmodo.com.
Sunday, September 20, 2009
How to remove new folder.exe virus from pendrive
If you are using pendrive for data transfer at school, college or at your office you must have come across this virus. This virus creates an exe file in your usb drive with the name New Folder.exe. Here are some symptoms of this virus.
■Task manager is disabled.
■Registry Editor is disabled.
■Folder options not working.
■Taking too much time for accessing pendrive.
■Uses half of your computers processing power.
You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it.Then click on “Delete Autorun.inf file”. After that click on ” Remove virus from USB”. The virus will be removed from your pendrive. To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore Default Windows Settings”.
■Task manager is disabled.
■Registry Editor is disabled.
■Folder options not working.
■Taking too much time for accessing pendrive.
■Uses half of your computers processing power.
You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it.Then click on “Delete Autorun.inf file”. After that click on ” Remove virus from USB”. The virus will be removed from your pendrive. To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore Default Windows Settings”.
Tuesday, September 1, 2009
A CPU History
The history of the processor is an interesting one, full of fierce competition and advanced technology, yet short in the terms of years. At the point where I will begin addressing this history, we are beginning with a 5 MHz 8086 processor, and today we are routinely seeing 1.8 GHz to up over 2 GHz. What a difference 20-some years can make. Let us start.
In the Beginning, there was 8086…
CPUs have gone through many changes through the few years since Intel came out with the first one. IBM chose Intel’s 8088 processor for the brains of the first PC. This choice by IBM is what made Intel the perceived leader of the CPU market. Intel remains the perceived leader of microprocessor development. While newer contenders have developed their own technologies for their own processors, Intel continues to remain more than a viable source of new technology in this market, with the ever-growing AMD nipping at their heels.
The first four generations of Intel processor took on the “8″ as the series name, which is why the technical types refer to this family of chips as the 8088, 8086, and 80186. This goes right on up to the 80486, or simply the 486. The following chips are considered the dinosaurs of the computer world. PC’s based on these processors are the kind that usually sit around in the garage or warehouse collecting dust. They are not of much use anymore, but us geeks don’t like throwing them out because they still work. You know who you are.
Intel 8086 (1978)This chip was skipped over for the original PC, but was used in a few later computers that didn’t amount to much. It was a true 16-bit processor and talked with its cards via a 16 wire data connection. The chip contained 29,000 transistors and 20 address lines that gave it the ability to talk with up to 1 MB of RAM. What is interesting is that the designers of the time never suspected anyone would ever need more than 1 MB of RAM. The chip was available in 5, 6,, 8, and 10 MHz versions.
Intel 8088 (1979) The 8088 is, for all practical purposes, identical to the 8086. The only difference is that it handles its address lines differently than the 8086. This chip was the one that was chosen for the first IBM PC, and like the 8086, it is able to work with the 8087 math coprocessor chip.
NEC V20 and V30 (1981)Clones of the 8088 and 8086. They are supposed to be about 30% faster than the Intel ones, though.
Intel 80186 (1980)The 186 was a popular chip. Many versions have been developed in its history. Buyers could choose from CHMOS or HMOS, 8-bit or 16-bit versions, depending on what they needed. A CHMOS chip could run at twice the clock speed and at one fourth the power of the HMOS chip. In 1990, Intel came out with the Enhanced 186 family. They all shared a common core design. They had a 1-micron core design and ran at about 25MHz at 3 volts. The 80186 contained a high level of integration, with the system controller, interrupt controller, DMA controller and timing circuitry right on the CPU. Despite this, the 186 never found itself in a personal computer.
Intel 80286 (1982)A 16-bit, 134,000 transistor processor capable of addressing up to 16 MB of RAM. In addition to the increased physical memory support, this chip is able to work with virtual memory, thereby allowing much for expandability. The 286 was the first “real” processor. It introduced the concept of protected mode. This is the ability to multitask, having different programs run separately but at the same time. This ability was not taken advantage of by DOS, but future Operating Systems, such as Windows, could play with this new feature. On the the drawbacks of this ability, though, was that while it could switch from real mode to protected mode (real mode was intended to make it backwards compatible with the 8088’s), it could not switch back to real mode without a warm reboot. This chip was used by IBM in its Advanced Technology PC/AT and was used in a lot of IBM-compatibles. It ran at 8, 10, and 12.5 MHz, but later editions of the chip ran as high as 20 MHz. While these chips are considered paperweights today, they were rather revolutionary for the time period.
Intel 386 (1985 - 1990) The 386 signified a major increase in technology from Intel. The 386 was a 32-bit processor, meaning its data throughput was immediately twice that of the 286. Containing 275,000 transistors, the 80386DX processor came in 16, 20, 25, and 33 MHz versions. The 32-bit address bus allowed the chip to work with a full 4 GB of RAM and a staggering 64 TB of virtual memory. In addition, the 386 was the first chip to use instruction pipelining, which allows the processor to start working on the next instruction before the previous one is complete. While the chip could run in both real and protected mode (like the 286), it could also run in virtual real mode, allowing several reasl mode sessions to be run at a time. A multi-tasking operating system such as Windows was necessary to do this, though. In 1988, Intel released the 386SX, which was basically a low-fat version of the 386. It used the 16-bit data bus rather than the 32-bit, and it was slower, but it thus used less power and thus enabled Intel to promote the chip into desktops and even portables. In 1990, Intel released the 80386SL, which was basically an 855,00 transistor version of the 386SX processor, with ISA compatibility and power management circuitry. 386 chips were designed to be user friendly. All chips in the family were pin-for-pin compatible and they were binary compatible with the previous 186 chips, meaning that users didn’t have to get new software to use it. Also, the 386 offered power friendly features such as low voltage requirements and System Management Mode (SMM) which could power down various components to save power. Overall, this chip was a big step for chip development. It set the standard that many later chips would follow. It offered a simple design which developers could easily design for.
In the Beginning, there was 8086…
CPUs have gone through many changes through the few years since Intel came out with the first one. IBM chose Intel’s 8088 processor for the brains of the first PC. This choice by IBM is what made Intel the perceived leader of the CPU market. Intel remains the perceived leader of microprocessor development. While newer contenders have developed their own technologies for their own processors, Intel continues to remain more than a viable source of new technology in this market, with the ever-growing AMD nipping at their heels.
The first four generations of Intel processor took on the “8″ as the series name, which is why the technical types refer to this family of chips as the 8088, 8086, and 80186. This goes right on up to the 80486, or simply the 486. The following chips are considered the dinosaurs of the computer world. PC’s based on these processors are the kind that usually sit around in the garage or warehouse collecting dust. They are not of much use anymore, but us geeks don’t like throwing them out because they still work. You know who you are.
Intel 8086 (1978)This chip was skipped over for the original PC, but was used in a few later computers that didn’t amount to much. It was a true 16-bit processor and talked with its cards via a 16 wire data connection. The chip contained 29,000 transistors and 20 address lines that gave it the ability to talk with up to 1 MB of RAM. What is interesting is that the designers of the time never suspected anyone would ever need more than 1 MB of RAM. The chip was available in 5, 6,, 8, and 10 MHz versions.
Intel 8088 (1979) The 8088 is, for all practical purposes, identical to the 8086. The only difference is that it handles its address lines differently than the 8086. This chip was the one that was chosen for the first IBM PC, and like the 8086, it is able to work with the 8087 math coprocessor chip.
NEC V20 and V30 (1981)Clones of the 8088 and 8086. They are supposed to be about 30% faster than the Intel ones, though.
Intel 80186 (1980)The 186 was a popular chip. Many versions have been developed in its history. Buyers could choose from CHMOS or HMOS, 8-bit or 16-bit versions, depending on what they needed. A CHMOS chip could run at twice the clock speed and at one fourth the power of the HMOS chip. In 1990, Intel came out with the Enhanced 186 family. They all shared a common core design. They had a 1-micron core design and ran at about 25MHz at 3 volts. The 80186 contained a high level of integration, with the system controller, interrupt controller, DMA controller and timing circuitry right on the CPU. Despite this, the 186 never found itself in a personal computer.
Intel 80286 (1982)A 16-bit, 134,000 transistor processor capable of addressing up to 16 MB of RAM. In addition to the increased physical memory support, this chip is able to work with virtual memory, thereby allowing much for expandability. The 286 was the first “real” processor. It introduced the concept of protected mode. This is the ability to multitask, having different programs run separately but at the same time. This ability was not taken advantage of by DOS, but future Operating Systems, such as Windows, could play with this new feature. On the the drawbacks of this ability, though, was that while it could switch from real mode to protected mode (real mode was intended to make it backwards compatible with the 8088’s), it could not switch back to real mode without a warm reboot. This chip was used by IBM in its Advanced Technology PC/AT and was used in a lot of IBM-compatibles. It ran at 8, 10, and 12.5 MHz, but later editions of the chip ran as high as 20 MHz. While these chips are considered paperweights today, they were rather revolutionary for the time period.
Intel 386 (1985 - 1990) The 386 signified a major increase in technology from Intel. The 386 was a 32-bit processor, meaning its data throughput was immediately twice that of the 286. Containing 275,000 transistors, the 80386DX processor came in 16, 20, 25, and 33 MHz versions. The 32-bit address bus allowed the chip to work with a full 4 GB of RAM and a staggering 64 TB of virtual memory. In addition, the 386 was the first chip to use instruction pipelining, which allows the processor to start working on the next instruction before the previous one is complete. While the chip could run in both real and protected mode (like the 286), it could also run in virtual real mode, allowing several reasl mode sessions to be run at a time. A multi-tasking operating system such as Windows was necessary to do this, though. In 1988, Intel released the 386SX, which was basically a low-fat version of the 386. It used the 16-bit data bus rather than the 32-bit, and it was slower, but it thus used less power and thus enabled Intel to promote the chip into desktops and even portables. In 1990, Intel released the 80386SL, which was basically an 855,00 transistor version of the 386SX processor, with ISA compatibility and power management circuitry. 386 chips were designed to be user friendly. All chips in the family were pin-for-pin compatible and they were binary compatible with the previous 186 chips, meaning that users didn’t have to get new software to use it. Also, the 386 offered power friendly features such as low voltage requirements and System Management Mode (SMM) which could power down various components to save power. Overall, this chip was a big step for chip development. It set the standard that many later chips would follow. It offered a simple design which developers could easily design for.
Monday, August 31, 2009
3G TECHNOLOGY
3G refers to the third generation of mobile telephony (that is, cellular) technology. The third generation, as the name suggests, follows two earlier generations.The first generation (1G) began in the early 80's with commercial deployment of Advanced Mobile Phone Service (AMPS) cellular networks. Early AMPS networks used Frequency Division Multiplexing Access (FDMA) to carry analog voice over channels in the 800 MHz frequency band.The second generation (2G) emerged in the 90's when mobile operators deployed two competing digital voice standards. In North America, some operators adopted IS-95, which used Code Division Multiple Access (CDMA) to multiplex up to 64 calls per channel in the 800 MHz band. Across the world, many operators adopted the Global System for Mobile communication (GSM) standard, which used Time Division Multiple Access (TDMA) to multiplex up to 8 calls per channel in the 900 and 1800 MHz bands.The International Telecommunications Union (ITU) defined the third generation (3G) of mobile telephony standards – IMT-2000 – to facilitate growth, increase bandwidth, and support more diverse applications. For example, GSM could deliver not only voice, but also circuit-switched data at speeds up to 14.4 Kbps. But to support mobile multimedia applications, 3G had to deliver packet-switched data with better spectral efficiency, at far greater speeds.However, to get from 2G to 3G, mobile operators had make "evolutionary" upgrades to existing networks while simultaneously planning their "revolutionary" new mobile broadband networks. This lead to the establishment of two distinct 3G families: 3GPP and 3GPP2.The 3rd Generation Partnership Project (3GPP) was formed in 1998 to foster deployment of 3G networks that descended from GSM. 3GPP technologies evolved as follows. • General Packet Radio Service (GPRS) offered speeds up to 114 Kbps.• Enhanced Data Rates for Global Evolution (EDGE) reached up to 384 Kbps.• UMTS Wideband CDMA (WCDMA) offered downlink speeds up to 1.92 Mbps.• High Speed Downlink Packet Access (HSDPA) boosted the downlink to 14Mbps.• LTE Evolved UMTS Terrestrial Radio Access (E-UTRA) is aiming for 100 Mbps.GPRS deployments began in 2000, followed by EDGE in 2003. While these technologies are defined by IMT-2000, they are sometimes called "2.5G" because they did not offer multi-megabit data rates. EDGE has now been superceded by HSDPA (and its uplink partner HSUPA). According to the 3GPP, there were 166 HSDPA networks in 75 countries at the end of 2007. The next step for GSM operators: LTE E-UTRA, based on specifications completed in late 2008.A second organization – the 3rd Generation Partnership Project 2 (3GPP2) -- was formed to help North American and Asian operators using CDMA2000 transition to 3G. 3GPP2 technologies evolved as follows.• One Times Radio Transmission Technology (1xRTT) offered speeds up to 144 Kbps.• Evolution – Data Optimized (EV-DO) increased downlink speeds up to 2.4 Mbps.• EV-DO Rev. A boosted downlink peak speed to 3.1 Mbps and reduced latency.• EV-DO Rev. B can use 2 to 15 channels, with each downlink peaking at 4.9 Mbps.• Ultra Mobile Broadband (UMB) was slated to reach 288 Mbps on the downlink.1xRTT became available in 2002, followed by commercial EV-DO Rev. 0 in 2004. Here again, 1xRTT is referred to as "2.5G" because it served as a transitional step to EV-DO. EV-DO standards were extended twice – Revision A services emerged in 2006 and are now being succeeded by products that use Revision B to increase data rates by transmitting over multiple channels. The 3GPP2's next-generation technology, UMB, may not catch on, as many CDMA operators are now planning to evolve to LTE instead.In fact, LTE and UMB are often called 4G (fourth generation) technologies because they increase downlink speeds an order of magnitude. This label is a bit premature because what constitutes "4G" has not yet been standardized. The ITU is currently considering candidate technologies for inclusion in the 4G IMT-Advanced standard, including LTE, UMB, and WiMAX II. Goals for 4G include data rates of least 100 Mbps, use of OFDMA transmission, and packet-switched delivery of IP-based voice, data, and streaming multimedia. Getting started with 3G To explore how 3G is used in the enterprise, here are additional resources:Wireless 3G and 4G data standards: Central to business customers: Research shows that wireless data standards make a difference when enterprises decide which service provider should carry business applications.3G, 4G services advance, but old telecom pecking order still stands: 3G and 4G services are slowly becoming mainstream, but don't expect new arrivals to shake up the scene. While LTE and WiMax hype builds, era of 3G still just beginning: While LTE and WiMax battle for the 4G crown, 3G technologies are coming into their own.CONTRIBUTORS: Lisa PhiferLAST UPDATED: 10 Aug 2009
Read more about 3G:- Can't tell the generations apart without a program? See our Fast Guide to Mobile Telephony.
- Expert Tim Scannell explores the question: 'Is 3G ready for prime time?'
- Lisa Phifer explains the route to '3G wireless: The long and winding road.'
- 3g.co.uk offers an introduction to 3G.
Eta ar ekta site er
3G wireless technology represents the convergence of various 2G wireless telecommunications systems into a single uniform global system which includes terrestrial and satellite components in its functioning. 3G or the third-generation wireless refers to near future developments in personal & business wireless technology, especially relating to mobile communications. 3G or The Third Generation will usher in many benefits as roaming capability, broad bandwidth and high speed communication (upwards of 2Mbps). Network operators & telecommunications service providers are embracing the recently adopted global third generation (3G) wireless standards in order to cater to emerging user demands and to offer new services to their customers.3G wireless technology represents a shift from voice-centric services to multimedia-oriented like video, voice, data, fax services. The most interesting & useful aspect of 3G wireless technology is its ability to unify existing cellular standards such as GSM, CDMA and TDMA
3G -> Features PACKET EVERYWHERE
With Third Generation (3G), the information is split into separate but related “packets” before being transmitted and reassembled at the receiving end. Packet switching is similar to a jigsaw puzzle- the image that the puzzle represents is divided into pieces at the manufacturing factory and put into a plastic bag. During transportation of the now boxed jigsaw from the factory to the end user, the pieces get jumbled up. When the recipient empties the bag with all the pieces, they are reassembled to form the original image. All the pieces are all related and fit together, but the way they are transported and assembled varies. Packet switched data formats are much more common than their circuit switched counterparts. Other examples of packet-based data standards include TCP/IP, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). As such, whilst packet switching is new to the GSM world, it is well established elsewhere. In themobile world, CDPD (Cellular Digital Packet Data), PDCP (Personal Digital Cellular Packet), General Packet Radio Service (GPRS) and wireless X.25 technologies have been in operation for several years. X.25 is the international public access packet radio data network standard. INTERNET EVERYWHERE
The World Wide Web is becoming the primary
communications interface- people access the Internet for entertainment and information collection, the intranet for accessing company information and connecting with colleagues and the extranet for accessing customers and suppliers. These are all derivatives of the World Wide Web aimed at connecting different communities of interest. There is a trend away from storing information locally in specific software packages on PCs to remotely on the Internet. When you want to check your schedule or contacts, instead of using a software package such as “Act!”, you go onto the Internet site such as a portal. Hence, web browsing is a very important application for packet data.
HIGH SPEED
Speeds of up to 2 Megabits per second (Mbps) are achievable with Third Generation (3G). The data transmission rates will depend upon the environment the call is being made in- it is only indoors and in stationary environments that these types of data rates will be available. For high mobility, data rates of 144 kbps are expected to be available- this is only about three times the speed of today’s fixed telecoms modems.
NEW APPLICATIONS, BETTER APPLICATIONS
Third Generation (3G) facilitates several new applications that have not previously been readily available over mobile networks due to the limitations in data transmission speeds. These applications range from Web Browsing to file transfer to Home Automation- the ability to remotely access and control in-house appliances and machines. Because of the bandwidth increase, these applications will be even more easily available with 3G than they were previously with interim technologies such as GPRS.
SERVICE ACCESS
To use Third Generation (3G), users specifically need:
A mobile phone or terminal that supports Third Generation (3G) A subscription to a mobile telephone network that supports Third Generation (3G) Use of Third Generation (3G) must be enabled for that user.Automatic access to the 3G may be allowed by some mobile network operators, others will charge a monthly subscription and require a specific opt-in to use the service as they do with other nonvoice mobile services Knowledge of how to send and/ or receive Third Generation (3G) information using their specific model of mobile phone, including software and hardware configuration (this creates a customer service requirement) A destination to send or receive information through Third Generation (3G). From day one, Third Generation (3G) users can access any web page or other Internet applications- providing an immediate critical mass of users. These user requirements are not expected to change much for the meaningful use of 3G.
Read more about 3G:- Can't tell the generations apart without a program? See our Fast Guide to Mobile Telephony.
- Expert Tim Scannell explores the question: 'Is 3G ready for prime time?'
- Lisa Phifer explains the route to '3G wireless: The long and winding road.'
- 3g.co.uk offers an introduction to 3G.
Eta ar ekta site er
3G wireless technology represents the convergence of various 2G wireless telecommunications systems into a single uniform global system which includes terrestrial and satellite components in its functioning. 3G or the third-generation wireless refers to near future developments in personal & business wireless technology, especially relating to mobile communications. 3G or The Third Generation will usher in many benefits as roaming capability, broad bandwidth and high speed communication (upwards of 2Mbps). Network operators & telecommunications service providers are embracing the recently adopted global third generation (3G) wireless standards in order to cater to emerging user demands and to offer new services to their customers.3G wireless technology represents a shift from voice-centric services to multimedia-oriented like video, voice, data, fax services. The most interesting & useful aspect of 3G wireless technology is its ability to unify existing cellular standards such as GSM, CDMA and TDMA
3G -> Features PACKET EVERYWHERE
With Third Generation (3G), the information is split into separate but related “packets” before being transmitted and reassembled at the receiving end. Packet switching is similar to a jigsaw puzzle- the image that the puzzle represents is divided into pieces at the manufacturing factory and put into a plastic bag. During transportation of the now boxed jigsaw from the factory to the end user, the pieces get jumbled up. When the recipient empties the bag with all the pieces, they are reassembled to form the original image. All the pieces are all related and fit together, but the way they are transported and assembled varies. Packet switched data formats are much more common than their circuit switched counterparts. Other examples of packet-based data standards include TCP/IP, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). As such, whilst packet switching is new to the GSM world, it is well established elsewhere. In themobile world, CDPD (Cellular Digital Packet Data), PDCP (Personal Digital Cellular Packet), General Packet Radio Service (GPRS) and wireless X.25 technologies have been in operation for several years. X.25 is the international public access packet radio data network standard. INTERNET EVERYWHERE
The World Wide Web is becoming the primary
communications interface- people access the Internet for entertainment and information collection, the intranet for accessing company information and connecting with colleagues and the extranet for accessing customers and suppliers. These are all derivatives of the World Wide Web aimed at connecting different communities of interest. There is a trend away from storing information locally in specific software packages on PCs to remotely on the Internet. When you want to check your schedule or contacts, instead of using a software package such as “Act!”, you go onto the Internet site such as a portal. Hence, web browsing is a very important application for packet data.
HIGH SPEED
Speeds of up to 2 Megabits per second (Mbps) are achievable with Third Generation (3G). The data transmission rates will depend upon the environment the call is being made in- it is only indoors and in stationary environments that these types of data rates will be available. For high mobility, data rates of 144 kbps are expected to be available- this is only about three times the speed of today’s fixed telecoms modems.
NEW APPLICATIONS, BETTER APPLICATIONS
Third Generation (3G) facilitates several new applications that have not previously been readily available over mobile networks due to the limitations in data transmission speeds. These applications range from Web Browsing to file transfer to Home Automation- the ability to remotely access and control in-house appliances and machines. Because of the bandwidth increase, these applications will be even more easily available with 3G than they were previously with interim technologies such as GPRS.
SERVICE ACCESS
To use Third Generation (3G), users specifically need:
A mobile phone or terminal that supports Third Generation (3G) A subscription to a mobile telephone network that supports Third Generation (3G) Use of Third Generation (3G) must be enabled for that user.Automatic access to the 3G may be allowed by some mobile network operators, others will charge a monthly subscription and require a specific opt-in to use the service as they do with other nonvoice mobile services Knowledge of how to send and/ or receive Third Generation (3G) information using their specific model of mobile phone, including software and hardware configuration (this creates a customer service requirement) A destination to send or receive information through Third Generation (3G). From day one, Third Generation (3G) users can access any web page or other Internet applications- providing an immediate critical mass of users. These user requirements are not expected to change much for the meaningful use of 3G.
Subscribe to:
Comments (Atom)