Smartphones today are able to facilitate human needs must have a very high performance. So that mobile devices require a lot of power. So many smartphone manufacturers are promoting their products with a battery that can last a long time one of them is the iPhone.
IPhone devices manufactured by Apple is continuing to develop its technological capabilities. Recently they have patented the a new technology that can extend the device battery iPhone.
Reported by Apple Insider, the technology works by stalking or studying user behavior patterns smartphone during a certain period. Power consumption is adjusted based on the user’s habits in a way like turning off the hardware components, reducing the frequency, up to date email, and services that consume the data, close the software, thereby maximizing battery life.
If the regular iPhone user is traveling from 7 pm to 9 am, then sleep at 11, then the smartphone will notice the pattern with an automated way to cut power consumption at these times
Savings of Apple’s technology also involves a means of determining the location via GPS. Knowing the outcome smartphone anywhere casual users to charge the battery and when the battery is estimated to last up charging locations hereinafter, if not the austerity measures will be carried out.
Ironically, this technology utilizing the GPS service, which is one factor draining the battery on a modern smartphone. Patent application on the technology in question has been filed by Apple last year. Although it was not clear whether the will actually be implemented in the final product, may be the next generation iPhone will be able to study the behavior of the user to save the battery.

New Delhi: Asus announced the launch of the Transformer Book TX300 in India at Rs 91,999. The company claims it to be the world’s thinnest Window 8 tablet and detachable notebook.

The Asus Transformer Book is a 13.3-inch notebook with a detachable tablet which has a Full HD IPS touch panel and a 178 degree viewing angle. It comes with an Intel Core i5 processor. The Asus Transformer Book is available with Windows 8 Professional.

It can either be used as a Windows 8 multi-touch tablet or a notebook with keyboard and touchpad. It comes with two types of internal storage device. “As a tablet, the 128GB SSD means apps launch instantly for a slick and seamless Windows 8 experience, while ASUS WebStorage ensures easy access to secure cloud storage when travelling far and wide. Connect Asus Transformer Book to its notebook dock and it instantly becomes a fully functional notebook with up to a 500GB hard drive,” said the company.

In Notebook Mode, the Asus Transformer Book features a backlit keyboard with ambient light control that automatically adjusts its brightness to suit the surroundings. it has up to five hours of battery life in full notebook mode and up to eight hours in tablet mode. It has a front 720p HD and a rear 5-megapixel camera.

The Asus Transformer Book will be available in India across select Asus authorised retail outlets starting second week of July 2013.

Whether you’re a tinkerer with a custom rig, or you just aren’t sure why your computer’s fans are running, checking your CPU usage is a pretty common task. Instead of using a boring on-screen activity monitor though, you can hook up your machine to a car tachometer for constant feedback.

This hack comes courtesy of ivancreations, who created an entire PC monitoring block from real-world components. The full instructions are on his blog and needless to say, they’re pretty complicated. If you can makes heads and tails of his plans though, the results speak for themselves.

While the tachometer is my favourite part of the build, he also wired up some LED light grids to illustrate other vital system information as well. If you think you’re up to it, or just want a closer look, be sure to check out the source link.

In the previous issue we’ve become acquainted with a shell script and managed to create a very simple shell script. If we look, we did not perform any processing on the shell script. We only show a message on the screen and execute commands on the shell through shell script. What if we want to make the program more interactive shell script?

As with any programming language, shell script also serves to recognize the variables that can hold information temporarily for a variety of purposes, for example to compute or determine the output results. You may make as much as possible or use a variable in your shell script. Name the variables are independent, large and small letters should, but make it easier to remember, make it a habit to create standard rules in the manufacture of the variable name. At this writing, all variables will be written in lowercase.

Variables can be divided into two types, namely environment variables and user variables. Environment variables are variables that have been previously determined as a part of the shell used (bash). By default, the name of this variable using all capital letters. Example of this is the $ USER variable that will contain the user name you are currently using, $ HOME home directory which contains the address of the user that is used, and so forth. To display the entire value of an existing environment variable, you can use the set command in the terminal (Figure 1). User variable is the variable name specified by the user themselves and not by the shell used.

Variables can be accessed by using the dollar sign ($) before the variable name, for example, we have a variable named “my name”, to access the value stored in the variable, we use the $ my name. To give value to a variable, we use the sign “=” is immediately followed by the value we give without any spaces, for example my name = Willy. What if the value that we want to give is a sentence? Use double quotes as the opening and closing value of a variable, such as my name = “Willy Sudiarto Raharjo”. For example, see listing 1 and try running on your computer. Seen that the value of the variable Sudiarto be regarded as a command and not part of the variable because it is not enclosed in double quotation marks. Please be careful in giving a value to a variable.

You can combine environment variables and user variables in a shell script is the same, as in listing 2. What if want to write a message using the $ character, such as “It cost me $ 15”? If we are not careful, it could be a shell script would be wrong to interpret the information that we provide and try to take the value of variable 1 (which will not contain any) and display it as a “price 5”. To fix this, use the escape character to indicate that the next character will be recognized as a regular character and not as a substitute for a variable, which marks the backslash “\” as in listing 3.

One character that needs more attention is the backtick character “` “(position number 1 on the left side your keyboard) because this character has a special function in shell programming, which is able to accommodate the output of a shell command in a variable. As an example, we will hold the result of the date command into a variable date and display its contents using the echo command as in listing 4.

To be able to receive input from the user and store it into a variable, we can use the read function is followed by the name of the variable that we want to use to store the values ​​as in Example 5 listings.

Not only the mobile gadget manufacturers who likes sarcastic competitors through advertising, this trend also extends to the world of PC components. One example is a video advertisement for AMD graphics card product called “AMD Radeon Graphics Presents: The Fixer”.

It is said, a gamer complaining because the graphics card “brand X” is not capable of running the game his liking. Then comes the one who suggested the players that switch using AMD graphics cards. Here’s The Fixer, a figure in the story that will “fix” the problem gamers.

The Fixer suggestion was inserted various promotional messages. For example, there is mention of a given game bundle through series AMD Radeon graphics card is used on the Xbox console and the PlayStation 4 One. There are also allusions to the gait of the graphics card manufacturer AMD competitor in the mobile world.

Ad ends with a scene of two men walked into the yard. Belonged to the old graphics card gamer-that design is similar to one graphics card Nvidia GeForce-looked is held by The Fixer and slammed to the ground and destroyed with cruel.

Poor graphics card manufacturer’s logo is obfuscated in the video. Are still clearly visible is the color, the light green is synonymous with Nvidia GeForce.

Looks a little scared by the brutal actions that occurred in front of him, the players shouted, “You need to calm down!” are answered by The Fixer, “I never compromise (settle)”. The word “settle” here does have two meanings, namely “calm” and “compromise”. Meanwhile, “Never Settle” is the name of the game promo bundle on AMD graphics cards.

He might look a bit stiff and childish, this ad still worth a look with a cool head. Consumers in the end it will benefit from the competition between industry players.

Jakarta – WhatsApp is one of the instant messaging service that can be used by many types of cell phone operating system. Not surprisingly, WhatsApp has 250 million active users. According to the Wall Street Journal website, this amount is equivalent to the number of users on Twitter, Facebook Messenger, and Skype.
What’s more, the instant messaging application also does not include ads in their services. Users were not bothered by ads that sometimes appear like the other instant messaging services.
Now, WhatsApp update the application with new features for Windows Phone users. Some of the new features that include
1. Make voice calls;
2. Background API (Application Programming Interface) which can play music;
3. New Smiley;
4. Notifications are updated to the user;
5. Quick summary (if the application is open and the user clicks the notification, the application will open fast like on Android);
6. The user will be asked whether you want to save the conversation history, users can arrange it through the settings menu, and
7. Images are displayed larger.
Updates on Windows Phone devices can be downloaded in Windows Phone Store.

A few years ago a team of researchers from Brown University made headlines after they successfully demonstrated how a paralyzed woman who had lost the use of her arms and legs could control a robotic arm using her brainwaves. In a video, Cathy Hutchinson imagines drinking a cup of coffee, and the robotic arm brings the cup to her lips.

The scene is amazing, but also a little disturbing. Hutchinson is connected to the robotic arm through a rod-like “pedestal” driven into her skull. At one end of the pedestal, a bundle of gold wires is attached to a tiny array of microelectrodes that is implanted in the primary motor cortex of Hutchison’s brain. This sensor, which is about the size of a baby aspirin, records her neural activity. At the other end of the pedestal is an external cable that transmits neural data to a nearby computer, which translates the signals into code that guides the robotic arm.

This method, known as BrainGate, pretty much defined state-of-the-art brain-computer interfaces at the end of the last decade. If the idea of a rod-through-the-head computer interface makes you cringe, you are not alone.

For some time, a small team of researchers at UC Berkeley has been working on plans for a less invasive, wireless monitoring system. Earlier this month, they released a draft paper: “Neural Dust: An Ultrasonic, Low Power Solution for Chronic Brain-Machine Interfaces.”

Dongjin Seo, a graduate student in UC Berkeley’s electrical engineering and computer science department, authored the paper under the supervision of senior faculty members, including Michel Maharbiz who has famously created cyborg beetles for the US Defense Department.

Seo said the researchers’ goal is to build an implantable system that is ultra-miniature, extremely compliant, and scalable to be viable for a lifetime, for brain-machine interfaces. “With neural dust, due to its extreme scalability, this framework can be applied for Obama’s BRAIN initiative, which necessitates large-scale, parallel, and real-time monitoring of neurons,” Seo explained.

The Berkeley researchers propose to sprinkle the brain with tiny, dust-sized, wireless sensors. This would reduce the risk of infection from wiring up scores of sensors placed throughout the brain and limit the trauma to one initial operation. During that operation, the skull would be opened, and sensors would be inserted into the brain. At the same time a separate transceiver would be placed directly under the skull but above the brain. The transceiver would communicate with the sensors via ultrasound.

Another battery-powered transceiver outside the skull would receive data transmissions from the chip inside the skull and supply wireless power to it.  As the paper notes, this type of power transfer is already used in a variety of medical applications, including cochlear implants. Seo said the amount of power being proposed is within FDA and IEEE guidelines.

The idea of neural dust immediately sparked the imagination of futurists after the paper was published on arXiv.org on July 8. “The brilliance of this system is that it could potentially allow scientists to see what’s going on with thousands, tens of thousands, or even hundreds of thousands of neurons inside the brain at once,” wrote Ramez Naam, a senior associate at the Foresight Institute and author of “More Than Human: Embracing the promise of biological enhancement.”

But would neural dust have practical use for the growing industry of mind-controlled computer games and brain training apps? Jon Cowan, founder ofNeuroTek, is dubious. NeuroTek’s Peak Achievement Training has been used at the U.S. Olympic Training Center in Colorado Springs, as well as at other Olympic centers from China to Norway.

“[Neural dust] doesn’t have much practical promise because of the surgery it would require,” Cowan said. “I don’t think they’ll find too many people that would volunteer for it.” Cowan noted existing ways for measuring brainwaves that rely on external sensors may be crude, but they’re effective enough for today’s applications.

“We really believe this is a practical system and, more importantly, we think this is potentially a powerful framework for achieving what Obama has announced,” Seo said. Still, he pointed out that the paper is a draft. “It’s a concept paper,” he said. “It’s a theoretical study of what we think is possible in the realm of neural recording.”

By publishing the paper on arXiv.org, an online collection of preprints of scientific work, the team is hoping to spur involvement and feedback from scientists in different fields. Lots of challenges remain to be overcome before neural dust will be ready for live testing.

It is undeniable that over time, the popularity of Linux is increasing every day. Linux Kernel project which was originally just a fun project by Linux apparently transformed into a project that became the basis for the evolution of the digital world today.

We can see that more and more digital devices are therein using Linux in it. Changes were made in all areas so that Linux can be used by all users, both from the ground level up to the experts though.

One thing that remains a hallmark of Linux is the existence of a shell that is never lost on any Linux distro. Shell is a command-line interpreter on duty to translate the commands entered by the user directly to the system through the help of a terminal or console as a zoom interface (such as Command Prompt on the Windows platform). Although today most of the Linux distributions already to offering graphical display, the shell is still regarded as one of the strengths of Linux shell bridge where users can interact with the system in order to be more flexible. Many things can be done on a shell because we are dealing directly with the system, coupled with the many variants of the shell that offers a variety of features in it, such as csh, sh, bash, ksh, tcsh, ash, zsh, etc.

One of the most common type of shell used is BASH (Bourne-Again Shell) which was created by Bryan Fox in 1988. Shell is a replacement of the Bourne Shell (sh) existing first and is still used in some Linux distributions. Currently BASH shell has become a de facto standard for almost all Linux distributions because it is considered the most feature-rich and has a fairly high degree of portability. For comparison between variants shell can be seen on the Wikipedia website

To be able to understand the Linux system with better and also improve your productivity and take advantage of the flexibility offered by Linux, so it’s good we are trying to learn programming BASH script. PCplus using Slackware Linux distro, but this tutorial can be applied to all Linux distributions for use BASH version 4.2 and above. You can use any text editor because basically BASH script is plain text file. You can also try it on a Windows platform with the help of Cygwin,

open the editor:

1. The first step in creating a shell script is telling the system what shell you want to use, because it could be available in a Linux distribution over the shell variant. Because we want to use bash, then write this line in the first row of each bash shell script that will be created

This code is called the shebang and a special instruction that will determine what the interpreter is going to be used to process a shell script. For example, for a script that utilizes Perl interpreter, it will contain information

2. Because the shell script is basically able to execute commands on the shell, then we can run shell commands from a shell script. For example, we want to display today’s date along with the name that we use username to login. Use the code on the listing-1 as an example. Before you can run the script, give it execute permissions on the file with the command chmod + x’s listing 1.sh (adjust the file name you gave) then run the command.

Date command displays the current date information while whoami will menapilkan your user information to login.

3. What if we want to display the text coupled with a shell command? Use the echo function to display a message to the screen shown in listing-2. Echo function accepts parameters in the form of a text message that will be displayed kelayar. You might ask, why the date and user information are on different lines with text displayed? This is due essentially echo function will display a message and then change the next line. To be able to display an information to the right of the text is displayed, use the-n parameter on the function like echo in the listing-3.

4. You can try some of the commands contained in the location / bin and / usr / bin. If not sure of the usefulness of a command, run the command man <nama-perintah> on the console or terminal, for example, man ls and manual information about the ls command will be displayed. Each command has a variation of different parameters with each other, so there are times when we have to read the manual to know every option available.

San Francisco – Twitter introduced reforms for iOS and Android application on July 17, 2013. The update was a method of censorship of sensitive content, such as pornography and violence, which appeared in the early post-twit.
If Twitter states that an image or a video containing sensitive issues, Twitter will display a label containing the message. Users must click if you want to see the media.
Message in the label reads, “Media in circulation could contain sensitive content. Twit media settings can be set to inform you if the media contains sensitive content.” Then the user can click “View,” or “Always show my sensitive media.”
New features began to appear in the July 2013. Users can also tag pictures or video as a medium sensitive to the setting. So, Twitter can give a warning to others before they click the image or video that you post.
This is a simple way to keep Twitter users more comfortable and not bothered with unwanted content. Especially for the user of Twitter among children and adolescents.