Submitted by Sajeev on 30 September, 2008 - 12:33
The population of Japan is aging rapidly. Toyota has invested in
personal transportation and personal robotic assistance for quite some
The interest is that their continued focus on this market which is a smart move. The aging population worldwide (and others) will
benefit greatly from improved personal mechanical assistance.
The Winglet is one of Toyota’s people-assisting Toyota Partner Robots.
Designed to contribute to society by helping people enjoy a safe and
fully mobile life, the Winglet is a compact next-generation everyday
transport tool that offers advanced ease of use and expands the user’s
range of mobility.
The Winglet consists of a body that houses an electric motor, two
wheels and internal sensors that constantly monitor the user’s position
and make adjustments in power to ensure stability. Meanwhile, a unique
parallel link mechanism allows the rider to go forward, backward and
turn simply by shifting body weight, making the vehicle safe and useful
even in tight spaces or crowded environments.
Toyota plans various technical and consumer trials to gain feedback
during the Winglet’s lead-up to practical use. Practical tests of its
utility as a mobility tool are planned to begin in Autumn 2008 at
Central Japan International Airport (Centrair) near Nagoya, and Laguna
Gamagori, a seaside marine resort complex in Aichi Prefecture. Testing
of its usefulness in crowded and other conditions, and how non-users
react to the device, is to be carried out in 2009 at the Tressa
Yokohama shopping complex in Yokohama City.Read more..
Submitted by Sajeev on 30 September, 2008 - 12:25
Cool Invention helps tired players bounce back..
The device, called the Glove and invented by two Stanford biologists,
is used by the Niners during games and at practice for players’ health.
But its applications are far broader: from treating stroke and heart
attack victims to allowing soldiers to remain in the field longer under
It’s also a proven athletic performance enhancer - billed as better than steroids without any ill effects.
“We use the Glove primarily for health reasons,” said Dan Garza, the
49ers’ medical director. “But outside of sports, it has potential for a
lot of exciting things. This technology is a much more effective way of
cooling the core temperature than what we would typically do - misting,
fanning, cold towels, fluids.”
The Glove works by cooling the body from inside out, rather than
conventional approaches that cool from outside in. The device creates
an airtight seal around the wrist, pulls blood into the palm of the
hand and cools it before returning it to the heart and to overheated
muscles and organs. The palm is the ideal place for rapid cooling
because blood flow increases to the hands (and feet and face) as body
“These are natural mammalian radiators,” said Dennis Grahn, who invented the device with Stanford colleague Craig Heller.
Submitted by Sajeev on 29 September, 2008 - 18:21
“Treat your password like your toothbrush. Don’t let anybody else use
it, and get a new one every six months.” (Clifford Stoll)
are the scourge of the digital age. Again and again, we are tortured by
a multitude of passwords that force us to rack our brains for cryptic
words like ch14zdo.
Get used to it, say computer professionals.
You have a lot to be paranoid about. Password-based attacks are
steadily on the rise. The threat of large-scale computer crime is very
real, and stealing passwords is one of the easiest ways for a criminal
to launch an attack.
So if you’re succumbing to password
overload, follow these simple tips. They’ll help you protect and
remember passwords without demanding a whole lot of mental might.
1. Personal password algorithm.
Create a formula for devising all your passwords. Pick significant dates and wrap them into acronyms that symbolize the event.Read more..
Submitted by Sajeev on 29 September, 2008 - 18:17
Rank Create date Domain name
1. 15-Mar-1985 SYMBOLICS.COM
2. 24-Apr-1985 BBN.COM
3. 24-May-1985 THINK.COM
4. 11-Jul-1985 MCC.COM
5. 30-Sep-1985 DEC.COM
6. 07-Nov-1985 NORTHROP.COM
7. 09-Jan-1986 XEROX.COM
8. 17-Jan-1986 SRI.COM
9. 03-Mar-1986 HP.COM
10. 05-Mar-1986 BELLCORE.COM
11. 19-Mar-1986 IBM.COM
11. 19-Mar-1986 SUN.COM
13. 25-Mar-1986 INTEL.COM
14. 25-Mar-1986 TI.COM
15. 25-Apr-1986 ATT.COM
16. 08-May-1986 GMR.COM
17. 08-May-1986 TEK.COM
18. 10-Jul-1986 FMC.COM
19. 10-Jul-1986 UB.COM
20. 05-Aug-1986 BELL-ATL.COM
21. 05-Aug-1986 GE.COM
22. 05-Aug-1986 GREBYN.COM
23. 05-Aug-1986 ISC.COM
24. 05-Aug-1986 NSC.COM
25. 05-Aug-1986 STARGATE.COM
26. 02-Sep-1986 BOEING.COM
27. 18-Sep-1986 ITCORP.COM
28. 29-Sep-1986 SIEMENS.COM
29. 18-Oct-1986 PYRAMID.COM
30. 27-Oct-1986 ALPHACDC.COM
31. 27-Oct-1986 BDM.COM
32. 27-Oct-1986 FLUKE.COM
33. 27-Oct-1986 INMET.COM
34. 27-Oct-1986 KESMAI.COM
35. 27-Oct-1986 MENTOR.COM
36. 27-Oct-1986 NEC.COM
37. 27-Oct-1986 RAY.COM
38. 27-Oct-1986 ROSEMOUNT.COM
39. 27-Oct-1986 VORTEX.COM
40. 05-Nov-1986 ALCOA.COM
41. 05-Nov-1986 GTE.COM
42. 17-Nov-1986 ADOBE.COM
43. 17-Nov-1986 AMD.COM
44. 17-Nov-1986 DAS.COM
45. 17-Nov-1986 DATA-IO.COM
46. 17-Nov-1986 OCTOPUS.COM
47. 17-Nov-1986 PORTAL.COM
48. 17-Nov-1986 TELTONE.COM
49. 11-Dec-1986 3COM.COM
50. 11-Dec-1986 AMDAHL.COM
51. 11-Dec-1986 CCUR.COM
52. 11-Dec-1986 CI.COM
53. 11-Dec-1986 CONVERGENT.COM
54. 11-Dec-1986 DG.COM
55. 11-Dec-1986 PEREGRINE.COM
56. 11-Dec-1986 QUAD.COM
57. 11-Dec-1986 SQ.COM
58. 11-Dec-1986 TANDY.COM Read more..
Submitted by Sajeev on 29 September, 2008 - 18:11
Math can be terrifying for many people. This list will hopefully
improve your general knowledge of mathematical tricks and your speed
when you need to do math in your head.1. Multiplying by 9, or 99, or 999
Multiplying by 9 is really multiplying by 10-1.
So, 9×9 is just 9x(10-1) which is 9×10-9 which is 90-9 or 81.
Let’s try a harder example: 46×9 = 46×10-46 = 460-46 = 414.
One more example: 68×9 = 680-68 = 612.
To multiply by 99, you multiply by 100-1.
So, 46×99 = 46x(100-1) = 4600-46 = 4554.
Multiplying by 999 is similar to multiplying by 9 and by 99.
38×999 = 38x(1000-1) = 38000-38 = 37962.2. Multiplying by 11
To multiply a number by 11 you add pairs of numbers next to each other, except for the numbers on the edges.
Let me illustrate:
To multiply 436 by 11 go from right to left.
First write down the 6 then add 6 to its neighbor on the left, 3, to get 9.
Write down 9 to the left of 6.
Then add 4 to 3 to get 7. Write down 7.Read more..
Submitted by vismaya on 26 September, 2008 - 16:52
Submitted by Sajeev on 24 September, 2008 - 18:53
Chameleon Systems Inc, San Jose, California is one of the new breed of reconfigurable processor makers who claim that Chameleon chip which is its first Reconfigurable Communications Processor (RCP) is a reconfigurable processor which provides a design environment that allows customer to convert their algorithms to hardware configuration on the fly.
Submitted by Sajeev on 22 September, 2008 - 12:32
Your laptop battery has a finite amount of energy. By changing a few of your habits and configs on your laptop you can easily increase how long your battery will last per charge.
Depending upon the model, a notebook battery usually lasts from 1 to 8 hours. However, with efficient battery usage, an hour or two of battery power can significantly be increased. You can save battery power by using the built-in battery saving modes and by following good notebook battery-saving practices.
Built-in battery-saving modes are Stand By and Hibernate. In the Stand By mode, open applications are stored in the RAM, the hard disks power down, the monitor switches off, but the processor goes on running. When you again perform some activity of the mouse or the keyboard, then the hard disk powers up, the monitor switches on, and the data from the RAM is activated, restoring your notebook exactly the way you left it.Read more..
Submitted by Sajeev on 22 September, 2008 - 12:29
Flip, flap and zoom!
Soon this would become the mantra for two-wheeler riders in the coming years. After all, they will have an all-new option of a head gear, compatible with the latest blue-tooth enabled gadgets. It's light weight, transparent and can be folded and kept in a box as big as a goggle cover.
This GenNext helmet is the latest creation of National Institute of Design (NID)'s Apparel Designing and Merchandising department and is in process of being prototyped by a team led by Somesh Singh.
"This is a product which gives a lot more flexibility, visibility , strength, safety and of course stylen than regular helmets . It is a multi-layered helmet which can be pulled out to give the shape of an helmet. For storing it, the layers can be slipped back to give the helmet a shape of nothing bigger than a goggle and can easily find place in a bag," said Singh.
Helmets are very bulky and storing them is a difficult task. In cities where the driver and the pillion, both have to wear the helmet, the condition is worse. NID's folding helmet is a perfect solution.Read more..
Submitted by Sajeev on 22 September, 2008 - 12:23
Thieves gain access to personal information in many ways, but the most common method is to take it from the victim themselves. They steal mail such as account statements, new checks and offers of credit left in a mailbox, discarded in the trash or stored in an easy to access location in your home or office. They access credit card and personal identification from your purse or wallet. Without realizing, you may give the information directly to the criminal when you enter data at an unsecured or unknown website, or in response to a fraudulent request for account information through an unverified e-mail; this is known as "phishing". Thieves also ask for information from you through unsolicited phone calls, tricking you into thinking it is someone you know, such as your bank; this is known as "pretexting".
How does an Identity Thief get your personal information?
Professional Identity thieves know exactly how to get your personal information and these are some of the common means used:Read more..
Submitted by Sajeev on 22 September, 2008 - 12:23
Scientists at Oxford University are working on a 1930 invention by Albert Einstein to develop an environmentally friendly refrigerator which they claim will run without electricity.
Previous researches have suggested that modern fridges emit greenhouse gases called freons and as a result damage the environment. Now the Oxford team is developing appliances that can work without electricity and thereby reduce the gases.
In fact, they have already completed a prototype of a type of fridge patented in 1930 by Einstein and his colleague, the Hungarian physicist Leo Szilard, 'The Observer' reported. The design was partly used in the first domestic refrigerators before more efficient compressors became popular in the 1950s. It avoids the need for freons and instead uses ammonia, butane and water and takes advantage of the fact that liquids boil at lower temperatures when air pressure is lower.
"If you go to the top of Mount Everest, water boils at a much lower temperature than it does when you're at sea level and that's because the pressure is much lower up there," lead scientist Malcolm McCulloch said. Read more..
Submitted by Sajeev on 22 September, 2008 - 12:17
Take the following steps to prevent yourself from becoming a victim of identity theft:
In case of Credit cards, Debit cards, and Credit reports:
1. Reduce the number of credit and debit cards carried in your wallet. While using debit cards take advantage of online access to your bank account to monitor account activity frequently and report evidence of fraud to your financial institution immediately.
2. When using your credit and debit cards at restaurants and stores, pay attention to how the magnetic stripe information is swiped by the waiter or clerk because devices called skimmers can download the account number data onto a personal computer.
3. Do not use debit cards when shopping online, instead use a credit card because you are better protected in case of fraud.Read more..
Submitted by Sajeev on 22 September, 2008 - 12:14
How can Identity theft be investigated and prosecuted:
The investigation of identity theft is labor intensive and individual cases are usually considered to be too small because perpetrators usually victimize multiple victims in multiple jurisdictions. Victims do not even realize that they have been victimized until weeks or months after the crime has been committed, and can provide little assistance to law enforcement. Therefore, it has become a priority for the Departments of Justice and Treasury and the Federal Trade Commission (FTC) to pursue effective means of prevention, investigation, and prosecution of identity theft offenses.
Federal Criminal Laws:Read more..
Submitted by Sajeev on 22 September, 2008 - 12:10
Identity theft occurs when somebody steals a person’s name and other personal information for fraudulent purposes. Identity theft is a form of identity crime where somebody uses a false identity to commit a crime. It involves stealing victims' personal information and credentials, often to make purchases. It is an act of impersonating another by means of using the person's information, such as birth date, Social Security number, address, name, and bank account information. It is an fact the co-option of another person's personal information e.g., name, Social Security number, credit card number or passport without that person's knowledge and the fraudulent use of such knowledge. Identity theft is deliberately assuming another person's identity, usually to gain access to their finances or frame them for a crime. It can also be used to enable illegal immigration, terrorism, espionage, or changing identity permanently.
Once a criminal accesses the information he needs he can for example do the following:
1. Apply for a credit card in the victim’s name.Read more..
This articles explains how to change the MAC address of a network adapter.
The MAC address uniquely identifies the network card within the current network segment. It consists of a vendor id that is unique among all network vendors, and a relative id that is unique to the vendor. The address is hard-coded onto the network adapter. But since most of the drivers were deleveloped with the Windows Driver Development kit, the MAC adress is read from the Windows registry, when the card is initialized.
Submitted by Sajeev on 13 September, 2008 - 10:10
Hot on the trail of Wii Fit is another device that measures your balance (far more precisely than the video game's balance board, one would hope).
In development by MIT researchers, the iShoe is an insole containing a sensor that measures a foot's pressure distribution. The sensor sends the data to a computer, which analyzes the information with a special algorithm. The hope is that this technology will allow doctors to detect balance problems in patients before it's too late to take the necessary steps to fix them.
Let's hope these researchers run -- not walk -- with developing this technology to bring it to doctors as soon as possible.
Submitted by vismaya on 11 September, 2008 - 14:11
Here are a few handy tips to clean your priceless collection of CDs and DVD discs.
But before you try any of these methods, remember that the disc media is very delicate and you may unintentionally damage the shiny reflective surface if you are not careful:
» If dust particles are sticking to the CD surface, use a piece of soft cloth to wipe off the dust. To hold the CD, insert a finger or thumb inside the center hole of the CD or handle it by the edges but never touch the shiny surface.
» If the DVD surface feels sticky or greasy, mix some baby shampoo in lukewarm water and use cotton or soft cloth to gently rub the CD surface with this solution. Make sure the CD is completely dry (no water drops) before putting it back in the jewel case.
» If there are fingerprint marks on the CD surface, dip a soft cloth in Isopropyl Alcohol/Ethanol/Methanol and gently wipe the surface. Never use a petroleum based solvent like Acetone as that will permanently damage the CD surface.Read more..
Submitted by vismaya on 9 September, 2008 - 14:59