Month: May 2010

Google Chrome 5 Releases Stable Version

For the average Windows user, the news of release of Google Chrome 5 is not a big thing. For Mac and Linux users however, this news is impressive enough to warrant a cruise to Google Chrome’s download page. After all, its claim of monumental browsing speeds and new features is just begging for trial. After months of adjustments and bug fixing, Google Chrome 5 has gone stable. In its new form, Chrome 5 boasts of having bench marked speed boost, browser synchronization between computers, a more polished bookmark manager, more extensions and HTML5 support. Although this new version does not support Adobe Flash, Chrome promises to integrate this into later versions. Judging by the speed that Chrome developers work on improvements, this might not take long at all. Speed tests To mark unprecedented leaps in terms of browser speed, Chrome developers took it upon themselves to showcase their success through a Youtube video. The video features how Chrome’s speed fairs against a potato gun, lightning and the speed of sound. The effort was creative but not that impressive. It would have been probably more impressive was if the browsing speed of Chrome broke the space-time continuum; that would have been some unparalleled speed! In terms of humanly possible comparative tests, Chrome’s bench marked tests shows an improvement of more than 200% compared to its very first beta on 2008....

Read More

Computer Virus Infects a Man

Our world is ever changing and ever evolving. Some changes get buried in obscurity but some things become more evident. Partly because they are so much more interesting than others and partly because they take us to a future we have been dreaming and hearing about since we were kids. Similarly, from the realms of science fiction, a piece of news from BBC just found its way into reality: A man infected himself with a computer virus. Take note that Dr. Mark Gasson did it deliberately! Gasson, a cybernetics expert at the University of Reading, embedded a Radio Frequency Identification (RFID) chip under his skin and infected this chip with a computer virus. RFID tags have primarily been used for tagging animals in the wild. These tags contain packets of information about the animals and scientists use this information for cross-referencing their studies. Gassons’s RFID tag however belongs to a new breed of tags that are more complicated. For example, his tag provides security clearance and gives him access to his building in the University of Reading. It also gives him access to his mobile phone. Gasson compared the RFID tag to a mini-computer. His experiment delves into the susceptibility of implanted devices to computer viruses. To do that, Gasson with the help of his colleagues, uploaded a benign computer virus in to his implanted device. His study shows...

Read More

The Aperture 3.0: Here is the review

The Aperture 3.0 was launched in the market some time back so one wonders why it is being reviewed now. There was hope that there would be a real time review of lightroom 3 and Aperture 3. However, I was of the view that Lightroom and CS5 applications both would be there in the market at the same time. But, the CS5 applications happen to come out just recently. It now seems that Lightroom 3 should have come out not until June or July. The understanding from the talk around is that it is a good thing that we waited. The reason being Photoshop CS5 has a Adobe Camera RAW6. Since there are going to be auditory reducing improvements that will be incorporated in Lightroom 3. It also gives Apple a bit of leeway to sort out some bugs that are inherent in its release. Therefore, the version that we are reviewing now are 3.0.3. Mac Pro dual quad-core Nehalem Xeon 2.66 GHz 24GB RAM 120GB OCZ Vertex Turbo SSD system drive with separate HD RAID library disk Geforce GTX 285/Radeon 4870 test scenarios Dual NEC WUXi 2490 Spectraview monitors OS X 10.6.3 MacBook Pro Core2 Duo 2.4GHz 15″ Santa Rosa 4GB RAM 120GB OCZ Vertex SSD NVIDIA Geforce 8600M 256MB OS X 10.6.3 running 32-bit kernel The Aperture 3 has loads of tweaks and enhancements. There are so...

Read More

The review of the Super Mario Galaxy 2 showcases that Ninetendo has perfected the art of platforming

The first thought when you play the amazingly superb Super Mario Galaxy w is that the first few hours you are thought to be a real nincompoop but later on the game turns into one satisfying one. You will get the same kind of pleasure whether you play it in the 2D or 3D versions. It is on a constant path to success and shows the player one fantastic thing after another. The game is the direct step ahead version of the game Mario Galaxy. But this time round there is a ship shaped like Mario to be moved around the world map. This is filled with galaxies that are allocated a few stars to find out. You are able to land on the galaxy and then earn the star. There is also a comet coin to help you keep a track of the exploration. There are several different tasks that one needs to do in order to earn these stars. These tasks include fight bosses and you need to swim, fly, float and fall. All of this needs to be done in a jiffy so as to get past the enemies. The game ensures that one gets the most pleasurable of play ever. There are several moves that you need to maneuver around so as to get an exciting number of movements which are jump, grab, flip and...

Read More

This week’s tech information: Quantam teleportation and Axis of P2P Edition

Scientists have been able to gain a successful venture in being able to teleport quantum states between the uses of photon over a free space that is a distance of over ten miles. As the US copyright group begins to the proceedings to sue several thousands of file swappers in the federal court, Time Warner Cable has asked the judge to stop the group’s subpoenas. TWC has stated that at the maximum it can only handle 28 IP address lookups a month and not the 800 that the plaintiff wants to do. The net neutrality, localism and diversity are all the code words that will be used by Obama the Satan Worshipper. They will be used in the FCC to close down Glenn Beck and the other traditional voices. There is a one talk show host inside that will wage a war against FCC. You might wonder who actually wants cookies because the web browsers anyway divulge so much of information with which one can identify the user and track their online presence without them being aware of it at all. The RIAA ad the Congressional caucus has joined hands to find out the six most harmful websites for your privacy. The Ukrainian website mp3fiesta could actually put your family’s safety in jeopardy. The latest is that different social networking sites have been passing on information about their users...

Read More