Tuesday, October 28, 2008

mGuard Theft Recovery for your mobile phone

mGuard provides protection and safety from theft or loosing your cellphone device and helps to retrieve it back. Now the users can forget the fear of loosing their phone by protecting it using mGuard Software. As of now, mGuard is the world’s only Theft Recovery Software for Java phones(J2ME, JavaME, MIDP cellphones). mGuard does not rely on Bluetooth, GPRS or GPS for its functionality and hence it can be used on mobile phones and areas where these are unavailable. SMS based Remote Control and spy on the stolen phones will be possible on the next release of mGuard. The complete documentation is available at www.dexmobile.com in PDF format.
Features
*Worlds First Theft Recovery Solution for Java Phones
*Freeware
*SMS notification on SIM Change to predefined number
*Does not affect mobile performance in normal operation
*Complete Stealth operations
*Tiny installation footprint
*Easy Configuration
*Settings Password Protected
Currently Supports Sony Ericsson phones including
K530i
K550 K550i, K550c
K610 K610i, K610c, K618i
K790 K790i, K790c, K790a
K800 K800i, K800c
K810 K810i, K818c
K770,
S500i,S500c
T650i,T650c
W580 W580i, W580c
W610 W610i, W610c
W660 W660i
W710 W710i, W710c
W830 W830i, W830c
W850 W850i, W850c
W880 W880i, W888c
Z310 Z310i, Z310a
Z610 Z610i
Z710 Z710i, Z710c
Z750 Z750i,K850,W910i
Make sure to enable Messaging and autostart permissions after installation. You can get a free unlock code from www.dexmobile.com
Select Your Phone and Downlaod JAR File. Click Here.
Good Luck

Wednesday, October 22, 2008

Google announces Android mobile platform

Google on Monday announced a widely expected open-development platform for mobile devices backed by industry heavyweights like T-Mobile, HTC, Qualcomm and Motorola that could shake the wireless market to its core by simplifying and reducing the cost of developing mobile applications. The platform, called Android, has been developed by Google and others as part of the Open Handset Alliance, which has over 30 partners supporting it. The goal of this ambitious initiative is to spur innovation in the mobile space and accelerate improvements in how people use the Web via cell phones. The open-source platform will have a complete set of components, including an operating system, middleware stack, customizable user interface and applications.

The first Android-based phones should hit the market in the second half of 2008. The platform will be made available under an open-source license that will give a lot of flexibility to those who adopt it to modify its components and design services and products, Google said. Other founding members of the alliance include Broadcom, eBay, China Mobile, Intel, LG Electronics, NTT DoCoMo, Nvidia, Samsung, Sprint Nextel, Telecom Italia, Telefonica, Texas Instruments and Wind River. Noticeably absent from the list is traditional Google ally Apple, whose popular iPhone might see its innovation lead cut sooner than expected thanks to this Google effort. It looks we will see Google products everywhere sooner or later…

Source: PC World, Computerworld, releaselog

Monday, October 20, 2008

Worlds Best Download Manager-IDM

The best way to handle your downloads and increase download speeds. Added full support for Windows Vista, YouTube, Google Video, MySpaceTV, IE7 and Firefox.

Download Youtube Videos in a Flash with Internet Download Manager 5.14

Download Here

MediaFire Mirror

Installation Procedure
======================

step 1: Go to C:\WINDOWS\system32\drivers\etc\
(To do this Just copy the above address and paste it in RUN window , if You have Installed your OS in C: Drive )
step 2: Backup the hosts file (Copy and Paste it to My Document Folder)
step 3: Open the hosts file in Notepad (Use Open With)
step 4: Enter the text bellow to end (You can use any IP without IDM site IP - I recommend to Use the Router address Eg: 192.168.1.1 my router)

You can see how my one is appears ar hosts.txt file and make your one accordingly.

192.168.2.1 www.internetdownloadmanager.com
192.168.2.1 http://www.internetdownloadmanager.com/
192.168.2.1 http://internetdownloadmanager.com/
step 5: Save and Close
{{{ After edit with notepad it's like this

127.0.0.1 localhost
192.168.2.1 www.internetdownloadmanager.com
192.168.2.1 http://www.internetdownloadmanager.com/
192.168.2.1 http://internetdownloadmanager.com/

}}}

step 6: Restart the computer
step 7: After restart install internet download manager
step 8: After install open internet download manager
step 9: In registration menu click registration
step 10: Now run keygenerator
step 11: After register open ur browser and try to visit www.internetdownloadmanager.com
step 12: If browser dont go to the Above THREE URLs, everything is successfull.


If you want any help contact me

harshana84sl@gmail.com

Monday, October 13, 2008

Applications of ARTIFICIAL INTELLIGENCE

Gaming
You can buy machines that can play master level chess for a few hundred dollars. There is some AI in them, but they play well against people mainly through brute force computation--looking at hundreds of thousands of positions. To beat a world champion by brute force and known reliable heuristics requires being able to look at 200 million positions per second.

Speech recognition
In the 1990s, computer speech recognition reached a practical level for limited purposes. Thus United Airlines has replaced its keyboard tree for flight information by a system using speech recognition of flight numbers and city names. It is quite convenient. On the the other hand, while it is possible to instruct some computers using speech, most users have gone back to the keyboard and the mouse as still more convenient.

Understanding natural language
Just getting a sequence of words into a computer is not enough. Parsing sentences is not enough either. The computer has to be provided with an understanding of the domain the text is about, and this is presently possible only for very limited domains.

Computer vision
The world is composed of three-dimensional objects, but the inputs to the human eye and computers' TV cameras are two dimensional. Some useful programs can work solely in two dimensions, but full computer vision requires partial three-dimensional information that is not just a set of two-dimensional views. At present there are only limited ways of representing three-dimensional information directly, and they are not as good as what humans evidently use.

Expert systems
A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their knowledge in a computer program for carrying out some task. How well this works depends on whether the intellectual mechanisms required for the task are within the present state of AI. When this turned out not to be so, there were many disappointing results. One of the first expert systems was MYCIN in 1974, which diagnosed bacterial infections of the blood and suggested treatments. It did better than medical students or practicing doctors, provided its limitations were observed. Namely, its ontology included bacteria, symptoms, and treatments and did not include patients, doctors, hospitals, death, recovery, and events occurring in time. Its interactions depended on a single patient being considered. Since the experts consulted by the knowledge engineers knew about patients, doctors, death, recovery, etc., it is clear that the knowledge engineers forced what the experts told them into a predetermined framework. In the present state of AI, this has to be true. The usefulness of current expert systems depends on their users having common sense.

Heuristic classification
One of the most feasible kinds of expert system given the present knowledge of AI is to put some information in one of a fixed set of categories using several sources of information. An example is advising whether to accept a proposed credit card purchase. Information is available about the owner of the credit card, his record of payment and also about the item he is buying and about the establishment from which he is buying it (e.g., about whether there have been previous credit card frauds at this establishment).


Friday, October 10, 2008

Interactive art

Interactive art is a form of art that involves the spectator in some way that experience the reality. Some objects achieve this by letting the observer walk in, on, and around the piece. Digital art are highly interactive. Sometimes viewers are able to navigate through a virtual environment.
Interactive art can be distinguished from Generative art,Electronic art or Immersion art in that it is a dialog between the piece and the participant;. In contrast, Generative Art tends to be a monologue -- the artwork may change or evolve in the presence of the viewer, but the viewer may not be invited to engage in the reaction but "merely" enjoy it.
In terms of the creation of agency, unique interface design, electronic artists are at the forefront of the artistic exploration of interactivity. Such artists have been early adopters of new interfaces and techniques for obtaining user input (such as dog vision, alternative sensors, voice analysis, etc.); new forms and tools for information display (such as video projection, lasers, robotic and mechatronic actuators, etc.); new modes for human-human and human-machine communication (through the Internet and other telecommunications networks); and new social contexts for interactive systems (including but not limited to utilitarian tools, formal experiments, games and entertainment, social critique, and political liberation).Interactive art also can used to virtually restore ancient artifacts.

Wednesday, October 8, 2008

Wearable computers

Wearable computers are computer that can be worn on the body. They have been applied to areas such as behavioral monitoring, health monitoring systems, information technologies and media and entertainment. Specially in military, and health professionals have all incorporated wearable computers into their daily operations. Wearable computers are especially useful for situations that require computational support while the user attention are actively engaged with the physical environment.
One of the main features of a wearable computer is a constant interaction between the computer and user. Another feature is the ability to multi-task. It is not necessary to stop what you are doing to use the device. it is augmented into all other actions. It can therefore be an extension of the user’s mind and/or body.
Wearable Computing is very useful for military purposes, which military personal can interact directly with the device without blocking the mind in the middle of the war field.
Blog Widget by LinkWithin

Hit Counter

WebLogger Stats