Link Market - Free Link Exchange, Link Building and Link Trade Directory
Have you ever tried to exchange links, link building, or trade links? Was it hard? Use link market instead; - it is easy to use, free and very smart. It will save you hours of work.

Rabu, 15 Desember 2010

Internet Radio of the Hand phone



Click Here!
Apple iPod touch 8 GB (4th Generation) NEWEST MODEL


Internet radio or also known as web radio, net radio, streaming radio or e-radio is an audio broadcasting service transmitted via the Internet. There are several methods of broadcasting on the internet. Some streams are transmitted, where listeners could simply plug the ears without being able to control the content of the conventional broadcast media like radio. There is also an adopted "on-demand", or as requested by users. Not infrequently, the radio stations on the Internet relay broadcasting on terrestrial radio stations.
Virtual Radio is an application that allows users of Symbian and Java mobile phones to listen to online radio through the Internet. Virtual Radio connects us to our cellular network and to more than 1800 radio stations in 75 categories from around the world.
In addition to over a cellular network, on expensive phones that have Wi-Fi facilities we can utilize the facility to access the online radio.
The resulting sound quality Virtual Radio is highly dependent on the bandwidth settings you set. Low Bandwidth Stream option will result in quality MP3 mono with a bit rate of no more than 32 kbps. Stream settings can be set in 8000, 11,025, 16,000, 22,050, 32,000 or 44,100 kHz. The recommended bit rate is 16,000 or 22,050 kHz. We can use the Shoutcast server or Icecast server. In mode "Low bandwidth stream", the user can follow all the virtual radio channels.
Another option, High bandwidth stream, resulting in 128 kbps MP3 stereo sound with a bit rate of 44.1 kHz or 64 kbps MP3 mono quality with bit rate 44.1 kHz. This option can only be used if we are using a 3G, HSDPA, or Wi-Fi
If we want to use this application, please visit www.vradio.org phone browser. On the web page that appears will display the download link appropriate application with the operating system, brands, and type your mobile phone. To optimize your Java phone try to listen to online radio in low quality (32 kbps).
Especially for symbian phones, available in two versions: a free version and paid version. Virtual radio in the free version will display ads on the main page of the application, while versions of "free advertising" to be paid U.S. $ 5.20
After determining the correct version for our phones, download the application by clicking the Download. Next, go to File Manager in our mobile phone and run the file we just downloaded. In the version of Java, when we will install the application, it will display a warning about the installation process. Confirm the installation process. Wait a while until the installation process Virtual Radio is ready for use.
Go to the phone application menu and choose Virtual Radio. Once the player is run, we can simply select the channel internet radio, and voice from the radio played. We do not need to set the play list or Internet URL or address.
Welcome to listen to online radio!

Sabtu, 11 Desember 2010

Internet Connection Sharing



Click Here!

Often we experience, we use a computer shared with our friends, for example to use internet access. But if we have more than one computer, then we can optimize the existing connection to access the Internet from another computer.
Connect the computer to the Internet network, can use wired or wireless. Then follow these steps:
1. Click "Start> Control Panel> Network and Internet> Network and Sharing Centre"
2. Discover the Tasks panel on the right; select the option "Manage Network Connection"
3. A new window will appear, and you will see a series of devices that are on our PCs. Right-click on the device that became the source of intake of internet access, and select Properties
4. Choose the tab "Sharing" in the Properties window
5. Give a check mark in front of the option "Allow network users to other the connect through this computer's Internet Connection"
6. In the Home networking connection, select the type of network connection that we will use: Local Area Connection or Wireless Network Connection
7. If we want the connection is established every time a request from a client computer put a check mark in front of the option "Establish a Dial up Connection Whenever a Computer on My Network Attempts to Access the Internet"
8. Click the "Settings" newly active
9. Give a check mark in front of service options that will be divided-put the. If you want to share all types of services available on the internet, put a check mark in front of all service options.
10. Press "OK" to save all the changes we have done

After making all these changes, make sure that our IP is connected to the Internet is the IP 192.168.0.1 to the other computer IP set its premises range between 192.168.0.2 to 192.168.0.254, while the gateway and DNS it to 192.168.0.1

Senin, 06 Desember 2010

Tips To Optimize Our Netbook



Apple iPod touch 32 GB (4th Generation) NEWEST MODEL
Click Here!

Netbook that we use everyday, although superior in terms of portability, but it has limitations compared with laptops

Here are tips to use a netbook to be optimal:
1. Buy a nice bag
There is nothing wrong if we buy a better quality bag. Advantages, in addition to more secure we can also carry some accessories netbooks, like the mouse and charger
2. Prepare the Battery Backup
If we travel frequently, have a large capacity battery, or search for a netbook that has a large capacity battery. The downside, its body would rather stand out in the battery side
3. Do not upgrade operating system.
Because of the limited hardware capabilities, do not upgrade the operating system. For example, Windows XP still gives the best performance for netbooks
4. Connect the Keyboard and Mouse
If we need extra comfort, there's no harm in using a keyboard and external mouse with a USB connection. Maybe it could be used folding keyboard and mouse are a bit small
5. External Optical Drive
Due to the small physical form, then the optical drive is not installed . If you often and want to read data from media such as CDs and DVDs, External Optical Drive is a solution
6. Run the application as needed
Run the application that needed it, and determine priorities. Unlike the PC or laptop, netbook is designed as a second computer and to carry
7. Gaming Machines
Netbooks can still be used to run the game lightly, like gamehouse. Various types of minigame we can enjoy without having to lose in netbooks fun factor.
8. External Monitor
Due to the small screen size, so those of us who frequently use the netbook in the same place could use an external monitor for more convenient in use

Kamis, 02 Desember 2010

Import Blog Post into to your Twitter account



Apple iPod touch 32 GB (4th Generation) NEWEST MODEL
Click Here!

For those Twitter and Blogger, make Twitter account and your blog to connect with one another so that each time you make a post on the blog, Twitter is also an update on the status of your Twitter account
In this case the Twitter does not provide specific features to import external blog posting into your Twitter account, but not impossible. Through the services provided twitterfeed.com it can be done easily enough

1. Point your browser to http://www.twitterfeed.com. Before using the services provided, we have to register it first. Click the link 'Register Now'

2. There are three steps we need to do. Step one: Create Feed. Fill in Name and RSS Feeds that you will use. Use the test button to check if the rss feed link that you have entered is correct or not. Do not forget to check the option active. When finished click the Continue button to step 2.

3. At the Configure Publishing Services, Services Available section, select the menu Twitter, because we will link it to your Twitter account.

4. Then it will appear a view: 'choosing existing Account or Authenticate new Twitter Account'. In this section we will make arrangements on twitter account that will be connected. Number 1 select 'Twitter Account'. No. 2 selects 'Authentic Twitter Account'

5. Then input your email and password of your Twitter account. Click the ‘Allow’ button to allow it to connect with your Twitter account

6. After that it will appear a view with two options, "Create Service" and "Cancel". Click the "Create Service", and you will get a confirmation that you have managed to set up feeds on your Twitter account

7. The result will be can you see on your Twitter account pages

Jumat, 26 November 2010

Sharing Internet with Connectivity 2.1.0.16429



Xbox 360 4GB Console
Click Here!

Connectivity is an application for Windows 7 that can turn a laptop or computer can share the Internet with friends, coworkers, or mobile device. Connectivity allows us to share wireless internet and without any additional hardware. We can easily connect a Wi-Fi device that is activated into our private network, including laptops, mobile phones, gaming systems, and much more.
Wi-Fi devices that enabled to view and incorporate your Connectivity hotspots such as Wi-Fi access point, as well as keeping with WPA 2 encryption.
With Connectivity, we can expand our home network router. The latest version of the Connectivity is 2.1.0.16429. This version is compatible with Windows 7 Starter Edition, support with PS3 and Xbox 360 clients, and to share the VPN connection
more info please open www.connectivity.me

SpeedyFox 1.5



Kindle Wireless Reading Device, Wi-Fi, 6" Display - with New E Ink (Pearl) Technology
Click Here!

Mozilla Firefox is a browser feature-rich and fast. However, from time to time Firefox is much slower. And this will take much time to load during startup, resulting in overall speed and the search for Histories will be too slow. This issue is a very common and mostly due to fragmentation of the database.
Speedy fox is a small utility that resolve this problem with a single click! It seems hard to believe, but after optimizing Firefox with this tool, we'll get a feel fresh because it will get up to 3 times the speed of start up, browsing history will be faster, and the display operation with the cookies would be much faster than the previously.
The method used in SpeedyFox is 100% safe for our profile, because it has been well documented and tested on many computers
To find out more please go to www.freewarefiles.com/downloads_counter.php?programid=51382

Senin, 22 November 2010

Creating Documents in Windows Phone



Click Here!
Kingston 4 GB Class 4 SDHC Flash Memory Card SD4/4GBET

Do you want to create a document in Windows mobile? There is Microsoft Office Mobile 2010 (http://www.microsoft.com/office/2010/en/mobile). This is an Office application for Windows mobile. In one package is available Microsoft Word Mobile, Microsoft Power Point Mobile, Microsoft Excel Mobile, Microsoft One Note Mobile and SharePoint Work share Mobile. If in your phone not found this application, you can download it at the Windows Marketplace in the phone's main menu.

Advantages possessed by Microsoft Office Mobile 2010 are a resemblance to Microsoft Word, Excel, PowerPoint, OneNote and Outlook on the computer. As a result we almost do not need to learn again to use it. Features and menus are the same, because they are released by the same vendor of the PC version, Microsoft.
To create a document, we simply run an Office application from the phone's main menu. Once implemented, we can directly type in the contents of the document via a virtual keyboard or phone keypad, if our Windows Phone is completed by keypad. Document that is so can be stored by pressing the menu File> Save as
Menu on the mobile version of Office is simple. But it was quite ok if the aim simply to make digital documents on mobile phones



Find Work at LinkedIn



Click Here!
LinkedIn is different from other social networking sites; we can find a job according to our wishes. Want to know how? Follow this trick

1. Open the browser, and then visit the site linkedkln (www.linkedin.com)
2. Login to the site LinkedIn
3. Click the Jobs link at the top of the window. We will be brought to the tabs Home Jobs
4. Type the job position that we want in the column keywords
5. Click the Search button
6. The search results will be displayed. Click on one of the vacancies to see details
7. Click on the link located at the very bottom of the information to apply for job vacancies

Sabtu, 20 November 2010

WiFi Signal Optimization Tips



Click Here!
unlike cable, WiFi signal is more sensitive to disturbance. The more interference, the slower in transferring our data. Now, how that connection is not getting slow, consider the following tips:

1. Put WiFi devices away from the objects / devices that emit strong electromagnetic signals. For example, power stations, power supply, power cables and similar objects

2. Do not place the Access Point or WiFi clients in an isolated place, e.g. under a desk, inside the server room. Better to place the Access Point in the middle of the room or in a glass chamber

3. Select a wireless device that has external antenna or can be replaced. This can facilitate the correction signal when the device placement

Rabu, 17 November 2010

How to Apply SEO through Social Networking Sites?



Transcend 8 GB Class 6 SDHC Flash Memory Card TS8GSDHC6E
Click Here!

Face book is still to be excellent, can be used as a site other than friendship, this site also be a place for traffic. How do I order to get traffic from face book, following his tips:

1. Profile Page and Fan Page
Create a personal profile of yourself give detailed information about you such as making the usual profile? Fulfill your list of friends who would be well advised to inanity Fans Page. Fans Create Blog PGE in accordance with you, for example about Gadgets, create a Page that contains about Gadgets, for example, you give the title "Update Gadget Addiction. Setting Page with interesting to fans at home and want to join. To look perfect, you post some blog posts at Wall Fans. The point that fans and prospective fans think of this blog seriously and not arbitrary. If you've made now is the time Suggest to your friends. Facebook create viral systems on Fans Page and Group which means that every Facebook user who joins will be emblazoned on friend list their home pages. There is another way, ask your friends to help Suggest Friends, too. That way you will get a lot of new fans, it's easy right?


2. Optimize Twitter
Besides Facebook ,Twitter also became an idol today. Create Twitter account and fill the follower. You must be diligent in updating the status that led to your Fans Page. Find the attractive words so the follower will Re Tweet you, or ask your friends again for Re-Tweet you.

3. Press Release Site
Smart in English? Maybe this is a way to introduce you to the PR Page site (Press Release). Create a post about five paragraphs that describe your Fans Page. Create with correct grammar, because some PR sites are usually reviewed the writings of the new entry. So if your objective is want to escape censorship, ask for help from a friend who is clever in English for correct papers will be sent. Once he completed the job, send papers to 10 of PR sites your and be ready your text to appear on Google within a few hours ahead.

4. You Tube Videos
If your blog review about Gadgets, create a gadget video review and give the watermark to the Fans Page. Give it an interest title to visitors stopped by your You Tube link.

5. Attend to Forums
Forum could also serve as an idea to bring Fans Page. The way how to attend forum is, find forums that provides a signature feature, create a signature and give a link to the Fans Page. Create interesting sentences for forum members to come to Page and join. To get more, be active in the forum and make the articles interesting. In addition to bringing to the page, you can also bring traffic to your blog.


6. Banner.
If you have more money, lease a location forum banner or website . This may seem expensive, in addition to designing prosecuted.

7. Facebook Advertising
Besides it can promote the site, Facebook can also promote the Page. If you have a credit card, you can take an advantage of this method.

8. Social Bookmarking
Find a list of Social Bookmarking sites, apply and post a your Link Page there. Do not be lazy to do this, because it was so boring, but you will get the impact of posting links

9. Twitterfeed
Use free facility from Twitterfeed. Yes, by using Twitterfeed you need not to post your article in your blog. Now, if everything is done, it's time to tidy the blog up to make it looked more professional.

Sabtu, 13 November 2010

Adding Back links Through Article



Here are some powerful enough ways to raise the SERP (Search Engine Rank Position) websites that we have is to find back links by making articles
1. Find Prey
Do a search site that has a topic similar to sites that we have. If our site is in English-language , which is also done on the site in English. Try to find sites that use CMS Word Press, because Google likes sites that are often updated, in this blog using Word press script
2. Domain Whois
After the meet, open domaintools.com and content of the site had just searched, and then press ENTER. Wait some time and identity of the owner of the site will be displayed clearly. If you are not lucky we will find an empty identity, then we will be friends with the owner of the site.
3. Send an Email
Write a short email offer in the potential of our friends whose contents offer a link exchange with the article. With a record of the article is fresh or has never been published. In order not to look like spam, make a formal email to introduce who we are, a site that we manage and what the purpose and objectives. To be optimal, do this to many sites. This is to anticipate the rejection of the site owners, because not all are willing to accept barter for several reasons.
4. Create article
Articles that we will create, not too serious, make it as easy as possible. For example, look for articles that are spread on the internet, after that read and write again with our own style but try to look different.
5. Barter Links and Articles
After contacting the owner of the site, make the offer if we will provide fresh articles, but on condition you link your site can appear on the site. Suppose we make one article with 400 words and in return, we can give 1-2 links
6. Resource Profiles
After the success of exchange links with the articles, now try to ask for bids again. We'll create the article with 800 words, but the link we put at the end of the article

Do the six steps too many sites; wait several days for Google to update the index, and almost certainly our site will increase significantly keyword. If you still do not believe, please try it!
Click Here!
Transcend 8 GB Class 6 SDHC Flash Memory Card TS8GSDHC6

Rabu, 10 November 2010

Optimization of Internet Explorer and Firefox by using the Full Speed 3.5




Full speed is an application that will increase the speed of our internet connection through a browser. Full speed quickly and will instantly configure the Windows operating system and browser so it will get the highest Internet access speeds can be achieved. This application can also be used to help improve other internet activities such as browsing websites, streaming video, upload and download, through connections on the network. Interestingly, this application can also be used as a benchmark basis of how fast connections that has, because in it there is a kind of benchmark with names Web Speed Test. From the name it was clear that this benchmark will measure how fast the connection using a browser-unfortunately, this application can only be optimized in two browsers, namely Internet Explorer and Firefox. After running the benchmarks, will be active Boost button that will optimize the performance of the browser with just one click. And if we are not satisfied with the results obtained available option to restore to its original configuration.
Full speed can be used as much as it is a free application. But there is also a paid Pro version with more complete functionality, ideal for Internet users who have a broadband connection
For more info can be found at http://www.getfullspeed.com/

Click Here!

Minggu, 07 November 2010

SEO: Select the Right Template




Template is required from a website. In addition to being characteristic, the template can also help boost the popularity of the website. In other words, the template also has an effect on SEO.
In the world of Search Engine Optimized, websites templates to be one of the most important factor. For this purpose, selection of an appropriate template is a must. Templates that are categorized as good and friendly with SEO is the template that not only facilitate the Google robots to index pages of websites, but also provide convenience to our visitors to explore the pages of the website. This Template is well known or often referred to as SEO friendly templates
SEO friendly templates usually give a lot of ease in modification. Both in terms of appearance, hack HTML Meta tags, social bookmarking buttons, as well as in such as Google Ad sense ads on web pages. The following traits templates SEO friendly:

* Templates that do not slow loading
A good template is a template that when opened first time (load speed) was quick. That is one important element in SEO. Which is not slow loading template will make visitors more comfortable in exploring the pages of the website
* Templates are comfortably viewed
It is a template that does not make your eyes get tired. Both in terms of writing articles as well as in terms of appearance. Articles are easy to read and interesting appearance will certainly spoil the visitor. The Template like this is one proof of the professionalism of the owner of the website.
* Templates that have social bookmarking buttons
this is very useful to pamper guests in bookmarking your article, because Social Bookmark given facility. Besides it is useful to visitors, articles that have been in-bookmarking Social Media will also provide benefits to the owner of the website because it articles that have been bookmarked will be easier indexed by search engines.
* Templates that have been in-hack HTML Meta Tags.
Modify (hack) the structure of an HTML Meta tag will allow Google Boot indexing a page in the website. This will create a website to be friendly with search engines (SEO Friendly)
* Templates that publish articles on the left
Why should the left? That is because the Google Boot indexing a web page starting from top left to right. If the article is on the left, of course the article would be more easily readable by the Google Bot (SEO Friendy)

Maybe this is a bit of the characteristics of the template SEO friendly. Do you use a template that already includes templates SEO Friendly?

Selasa, 02 November 2010

Applications SEO With the Power of Google Maps




Here is explained how to become number one in Google SEO without the hard work saved a lot of back link.
This method is very simple and widely used by many companies in the world to introduce their products to the public. Google Maps is used as a vehicle of new SEOs. Although many are used, they may not understand what the benefits of SEO.
In this paper we sketch how the mini-back link domain can sit at the top without work hard. The key is by using the city name and keywords. Remember do not be reversed, because if they switch places, then SEO is considered to fail, because the algorithm would be different if the keyword Google and the name of the city behind

Google Maps

Many people find the address on Google Maps, from the main road to the smallest alley. One additional feature that Google can investigate. But not many people know that Google Maps can also be used as a new SEO tools.

How to Start?

This is the initial requirement. To get the keyword in question, you need to get a domain name that begins with a city name and keywords. Egg "Hollywood Mobile Phones" at the top. Why? As it had been described in previous editions, has a smart domain name with high demand.
Besides Hollywood Mobile Phones, we can also experiment with other cities from the United States. Because for the moment Google only apply to U.S. and UK regions called Local Business.

Smart Domain Search

In the domain selection, it was to note and take advantage of Google's External Keyword to analyze the extent to which the city and the people search for keywords within a month. Just think back its good we see Google's External Tools commonly used by the Ad words advertiser.
Domains starting with the city and these keywords are not so idol seekers. But we can be more experimenting again to win this competition. As information, it is not easy to find the big city and many searchable keywords on Google. As we opened the Google External Keyword, there is also open one of our domain sales site, so we can find an interesting site.

Online Store Website

This article will explain how to create a website online store. But, if you want to use this method, our site must tend to sell the product, rather than an article. Because, basically, the seeker wants to make transactions of goods, rather than reading tips or tricks.
If we do not have a store, there are other ways to sell products. Register as an affiliate just like Amazon and Commission Junction.





Click Here!

Minggu, 31 Oktober 2010

Trojan.Fakealert , the Fake Antivirus




Maybe we never had the experience, when surfing in the virtual world suddenly raised pop up on our computer screen that can not be eliminated. Pop ups are stating that our computer got a virus, and to overcome them we must install the antivirus with a cost that has been determined. Be careful, because this is a fake antivirus. The virus is very disturbing, because in addition to spreading quickly, also has an interface similar to Microsoft's antivirus software, including Windows Defender, Microsoft Forefront, and Microsoft Security Essential.
With the latest up date, this one is actually a Trojan that can be easily identified. One of the reliable virus detection is Dr.Web Antivirus can be downloaded free at http://www.freedrweb.com/download cureit /.
How do these fake antivirus programs work? First, he would pretend to check the PC, and report that your PC infected with many viruses, in order to look convincing, these fake antivirus software then offers improvements, on condition that we buy a license. Antivirus also has a safety net for they can not be uninstalled.
According to Ad Sap (Vaksin.com vaccine), clean up such a program is actually easy, we just decided the Internet from your PC, turn off system restore and run the program Dr. Web Cure-It. If possible, fix the PC registry by following the steps in http://vaksin.com/2010/1010/fakealert/fakealert.htm





Click Here!

Senin, 25 Oktober 2010

SEO - Select the appropriate template




Selection of the appropriate templates can help boost the popularity of our website. This good template will allow robots to index pages of Google in the website, and provide convenience to our visitors to explore the pages of the website. This template is called an SEO friendly template.
Here's an SEO friendly template category:
1. Templates are pleasing to see
It is a template that is easy to read, and it has an interesting view, and not make our eyes tired quickly
2. Template that has been modified its HTML Meta tags
modifying the structure of HTML Meta tags will help facilitate the Google Bot to index a web page, and will create a website to be friendly with search engines
3. Template that publish his article on the left
If we write an article on the left, the Google Boot will make it easier to read, because Google Boot will index the pages of a website starting from top left to right
4. A fast loading template when opened.
Templates that are slowly opened will make visitors uncomfortable in exploring the pages of the website
5. Template that having a Social Bookmark button
Articles that have been bookmarked will provide benefits to us as the owner of the website because the article would be easier indexed by search engines







Click Here!

Kamis, 21 Oktober 2010

How to Save Easily your Laptop Battery

Click Here!


Because of it’s small shape, laptops are often brought everywhere by their owners. The problem is the limited capacity of the battery makes the laptop battery should be charged frequently. No wonder if in public places such as campuses or shopping malls are often filled with adapter cables laptop batteries.
Using a laptop while the battery is charged is the solution in order to it is always full. However, it is feared will make batteries become damaged over time. Because the flow of incoming electricity will continue even if the battery is fully charged.
Therefore, usually a few people always pull into the adapter when the battery indicator shows full. In addition, there also to remove the battery and then putting the battery adaptor. So the laptop will light up directly from the power source.
To get around so fast not a laptop battery runs out, you can adjust the brightness level to be not too bright. Therefore, the LCD screen on a laptop requires a large enough power to display images. This can make your eyes do not get tired of seeing images that are not too bright.
When finished watching a movie on a laptop, you should not forget to remove pieces of CD-ROM/DVD-CD-ROM compact disc / DVD-ROM, as it requires substantial battery power.
In addition, you also should not be lazy to turn off features on the laptop when not in use anymore. Features such as Bluetooth or Wi-Fi is turned off once completed should be used immediately.
There are some laptops have some sort of shortcut to activate and turn off the feature. So, you just press the button such features. If there is no shortcut, you can turn off features such as Wi-Fi connection manually using the Windows Control Panel in the Network Connection.
Conserve battery power was quite easy to do. All that can be started with a laptop with a more loving and caring way to use it wisely.





Virus Preventing in USB Gadgets








Many things we can do so no malware that went into gadgets or portable devices that store our owned data.

Today many malicious files, the main installer application files that are not clear, which involved a ride in a file that we downloaded from the internet. In order for the USB devices we're not plagued with viruses, there are some things we should do. If this is routinely done, and also secured a PC gadgets we use is guaranteed safe.

1. Do not download any files.
Many devices, such as tablet PCs, mobile phones and PDAs, can download the application directly via the Internet connection. On the phone, there is the term installation OTA (over the air), the application is done directly from the server to the mobile phone provider. Pick a clear source applications because of possible applications that contain spyware and adware installed

2. Doing routine scanning
We will not know when we infected the virus tool. Therefore, every time plugged into a PC, do the scanning. Use antivirus application-with a variety of choices for scanning. Some specific applications are provided as a safety external drives, like USB flash disks.

3. Prevent viral entry
If the data in the flash disk to be read on another computer, you can check the status of the disk to flash mode "read only". Some Flash disks provide this feature. Otherwise, use applications such as USB drives. If you are unsure of security in the PC is plugged into the device, for example when it had to charging gadgets via a USB cable, turn off the gadgets. In the Android phone, choose option "Unmount" in order to drive gadget is not detected the PC. On the Blackberry, there is an option to enable or disable the BB as a storage device when connected to a PC.

4. Install Antivirus
Install anti-virus applications, particularly in applying gadget smart phone or PDA operation. This method is effective enough to detect and remove malware. Some applications are provided free of charge, so we do not have to pay. This application must exist on your PDA or smart phone are often connected to the internet.

5. Do not accept any data
Do not exchange data from strangers in public places. Be careful, there are applications to send messages or chat Bluetooth, which at once sent to mobile phones targeted adware.

6. Make Back-ups
Data such as contact lists important telephone numbers or data stored on your hard disk eligible for reserved. So if the data in the gadget disappeared because of the virus, its reserves are still there. Online data backup service phones and PDAs is also available so it is more convenient.

7. Get immunizations
The purpose of immunization is to make the USB device being immune from malware threats such as autorun.if that can run automatically. Many applications can be used for this, such as Panda Panda-USB-and-autorun-Vaccine and USB Virus Scan. In this way a direct application to detect and remove malware when the device is plugged into the PC

Click Here!

Minggu, 18 Juli 2010

The More Quickly and Safely With Google Chrome Beta Version




Surfing in cyberspace will be more fast and convenient. Leave a problem of quality of Internet access that is not stable. Enjoy a variety of Internet browsers ease the increasingly rapid, practical and safe. Late last June that Google Inc. introduce the Internet browser or the latest version of Google Chrome browser. The browser is already equipped with applications faster, easier and safer. Chrome carried JavaScript V8 able to accelerate the execution process of the latest web applications. This browser is claimed to 200% faster than beta thanks to V8 versions.
Chrome provides feature extensions that allow users to pin a shortcut link to the web option in the menu bar. Users can also express their personal style by installing themes created by the designers, musicians, celebrities, and leading institutions.
For enhanced security, Google Chrome is equipped with features that can erase traces of the visit (history). There is also a safe browsing feature that detect and alert you when users visit malicious web pages.
Chrome beta was introduced since 2008 earlier been used by more than 70 million people. The youngest browser already have some features that make users more happy. One is the intuitive features that can take users to any site with some touch of a button. Each tab in Chrome is also working with the stable, so that when one tab is not working optimally, other tabs are not affected. Chrome can be downloaded for free at www.google.co.id / chrome
Click Here!

Sabtu, 17 Juli 2010

How to Apply SEO Through Social Networking Sites





Facebook is still to be excellent, can be used as a site other than friendship, this site also be a place for traffic. How do I order to get traffic from facebook, following his tips:

1. Profile Page and Fan Page
Create a personal profile of yourself, give detailed information about you such as making the usual profile. Fulfill your list of friends who would be well advised to nantiny Fans Page. Fans Create Blog PGE in accordance with you, for example about Gadgets, create a Page that contains about Gadgets, for example, you give the title "Update Gadget Addiction. Setting Page with interesting to fans at home and want to join. To look perfect, you post some blog posts at Wall Fans. The point that fans and prospective fans think of this blog seriously and not arbitrary. If you've made now is the time Suggest to your friends. Facebook create viral systems on Fans Page and Group which means that every Facebook user who joins will be emblazoned on friend list their home pages. There is another way, ask your friends to help Suggest Friends, too. That way you will get a lot of new fans, it's easy right?


2. Optimize Twitter
Besides Facebook ,Twitter also became an idol today. Create Twitter account and fill the follower. You must be diligent in updating the status that led to your Fans Page. Find the attractive words so the follower will Re Tweet you, or ask your friends again for Re-Tweet you.

3. Press Release Site
Smart in English? Maybe this is a way to introduce you to the PR Page site (Press Release). Create a post about five paragraphs that describe your Fans Page. Create with correct grammar, because some PR sites are usually reviewed the writings of the new entry. So if your objective is want to escape censorship, ask for help from a friend who is clever in English for correct papers will be sent. Once he completed the job, send papers to 10 of PR sites your and be ready your text to appear on Google within a few hours ahead.

4. You Tube Videos
If your blog review about Gadgets, create a gadget video review and give the watermark to the Fans Page. Give it an interest title to visitors stopped by your You Tube link.

5. Attend to Forums
Forum could also serve as an idea to bring Fans Page. The way how to attend forum is, find forums that provides a signature feature, create a signature and give a link to the Fans Page. Create interesting sentences for forum members to come to Page and join. To get more, be active in the forum and make the articles interesting. In addition to bringing to the page, you can also bring traffic to your blog.


6. Banner.
If you have more money, lease a location forum banner or website . This may seem expensive, in addition to designing prosecuted.

7. Facebook Advertising
Besides it can promote the site, Facebook can also promote the Page. If you have a credit card, you can take an advantage of this method.

8. Social Bookmarking
Find a list of Social Bookmarking sites, apply and post a your Link Page there. Do not be lazy to do this, because it was so boring, but you will get the impact of posting links

9. Twitterfeed
Use free facility from Twitterfeed. Yes, by using Twitterfeed you need not to post your article in your blog. Now, if everything is done, it's time to tidy the blog up to make it looked more professional.





Click Here!

Sabtu, 19 Juni 2010

Google, Star of Search Engine








Click Here!


Beginning last March, Google launched a new feature that will pamper you while browsing the Internet, Starred Search.
If you normally need to access the favorites menu in Internet Explorer or Bookmarks in Mozilla Firefox to save your favorite links, now tracks more easily and can catch more links. To try it, you must install the Google Toolbar (toolbar.google.com) on the computer. In this way, you can have a list of bookmarks that can be accessed from any computer connected to the Internet throughout the world through Google Toolbar.
The scenario is this: when you run a search on Google, a star icon appears next to each search result. By clicking the icon, the star will change color, then the page link will be listed in your bookmarks automatically (actually stored on your bookmarks.google.com account). Make sure you are logged into the Google Toolbar before utilizing the facility. To find all the links that you have marked, click on Bookmarks on the menu at one of the Google Toolbar.
There are a myriad of facility again if you click on the Bookmark All Manage. You can group a list of links based on criteria such as political, financial, or technology. Add a comment on a link, or arrange for a list of links can be accessible to others or just your own. This is useful when you're out and save the link roads while in the destination city.
One more greatness Google is quickly access information from the websites of your choice. On the Google Toolbar, click the + icon and then click Open Full Gallery. On that page, enter keywords, such as "technology". Furthermore, Google will display a link, then click Add to Toolbar on one of your choice. The results can be seen in the circular icon on the Google Toolbar.
By clicking the icon, you can see news about the technology from Newspapers, Magazines, etc. without having to visit the site one by one. It’s very practical isn’t it?

Anti Sluggish Batteries Laptop








Click Here!


When your laptop battery is damaged, it's your workload is heavier. Imagine the work that still accumulates, though hard to find a power source outside the office due to high mobility.
Now, in order to remain durable batteries, stop using the laptop on a pillow or cradle the closing vents in the bottom of the laptop. Ventilation holes must be getting air, so the heat of the battery can be reduced. Because of the excessive heat can reduce the battery life. Clean all vents free of dust regularly.
Want to know the secret in order to laptop battery not fast runs out? Add memory. The bigger the memory, the task increasingly hard drives in laptops lighter and does not require large power consumption

How to Increase your Follower at Twitter









Click Here!
At the first time appeared on twitter, usually celebrities directly have a high number of follower. It is naturally, because they already have a fan base in the real world. Just mention Brad Pitt, Tom Hanks.
Does this mean people who are not celebrities can not capture many a follower?
Ordinary people can also get a lot of twitter follower. Here is a tip:
- Do it consistently and regularly Tweet
- Focus Tweet on your expertise, such as fashion, technology or marketing. In this way the follower will see your value, so his comments are potentially interesting retweet others to become your follower.
- Be a follower as much as you can and try to communicate with them
- Active in twitter with or respond to retweet. Do not just write your status
- Combine with the blog so that users get to know your twitter and more interested in being your follower

Jumat, 04 Juni 2010

Fake Antivirus “Security Essential 2010”





Click Here!







Today dangerous applications attend in innovative face so the user can be fooled. The example is shown in the fake antivirus which includes the name “Security Essential 2010” which requires the user to do activation and must pay for the using of their “full version”. This name is similar to the free antivirus product of Microsoft named as Microsoft Security Essential (MSE). This fake antivirus is really a trojan win32/Fakeinit, which is already installed, can broke several running process at Windows through “monitoring” and “scanning” process.
This Trojan will weaken some security configuration at registry. The changes is shown clearly at the “Trojan infected” operating system is the raise of warning messages at the desktop background permanently. In face this problem, Microsoft has confirmed that their MSE has been able to overcome Trojan Fakeinit

Kamis, 03 Juni 2010

HTC Create Their Own OS,









Click Here!
Taiwan vendor, HTC, plan to develop their own operating system . All this time HTC is always cooperate to the vendor software, Microsoft for Windows Mobile and Google for Android. However until today there is no clear explanation the progress of their operating system development.
Beside it, HTC also plan to buy cellular phone producer, Palm which is also own their own operating system, WebOS. Rumor of this OS development makes analyst speculate that HTC feel disappoint to the Android. Previously, HTC was known got a significant benefit. In their report, this Taiwan producer created a profit in the first quarter of 2010 as US $ 1.2 billion. Compared to the same quarter last year, profit of HTC is increased as 19.2 percent. This profit if be calculated to their net profit in this first quarter apparently down as 8% compared to last year. In this first quarter, HTC really only get net profit in the mount of US $ 160 million

Selasa, 04 Mei 2010

Making Presentation CD

If at a moment, your newest presentation might be also wanted to owned by most of the audience. Usually, presentation file or slide is printed on a paper and distributed to all of audience. But animation and accessories you have been designed will not shown at a hard copy sheet. As the solution and you can distribute presentation file in the form of CD, and you need not save the file to the hard disk and burn it manually.
This is the way how to make it:
1. Click "File" button, and choose "Share" menu
2. At the right side menu, choose "Package"
3. Determine your presentation title at column "Name the CD"
4. Choose presentation file you want to insert to CD by clicking "Add" button
5. If password required to added to the CD presentation, choose menu "Option.."
and fill password at column "password to open each presentation and password
to modify each presentation" Click "OK" to save the password
6. Insert the empty CD to drive CD writer and click button "Copy to CD" to
start the making of CD

Selasa, 27 April 2010

About Google Chrome


It is no doubt that Google Chrome has been succeed in taking hart the user, until less than two (2) years. Google Chrome had taken 3rd position as web browser , above several old web browsers like Opera or Safari. And the question is, what is the interesting of Google Chrome? At least there are three (3) points the advantages of Google Chrome:
• Speed. Chrome is designed to run as fast as possible. Fast started from desktop , loading web page in seconds, and run complex web application fast.
• Simple. Chrome lay out is effective, clean and simple. At the first time Chrome is opened, we are not made busy with various menu or toolbar. Chrome is also completed with features designed for efficiency and make easier for the user. We can browse and navigate from the same box, and regulate tab matching with our need easily and faster. Some people state that Chrome has minimum user interface with modern lay out.
• Security. Chrome is designed to be secure and assure in web with internal phishing protection, automatic advance to make sure Chrome is always updated with newest security feature .
Some other features which are useful enough are direct translation from web, without needed in plug in or addition extension, and themes to make browser layout be beautiful starting from Chrome 3.0 and addition function through extension. At present, the most recent version of Google Chrome is version of 4.1 released on the end of last March.

Jumat, 16 April 2010

Repair Hyperlink

Hyperlink at the Office can be slowing down anytime. Soon after it is clicked, there is no respond. If you ever have experience with it, try to do the following tricks:

-If you are opening Office application, it is better to save your work first and closed your Office application
-You have to open your Internet Explorer application through desktop or via Quick Launch
-If Internet Explorer has been opened, drive your mouse to menu “Tools>Internet Options”.
-If the Internet Options window has been opened, click tab Programs. Check whether Internet Explorer is your default browser by clicking button radio Reset Web Setting and button Apply and close your Internet Explorer application
-Click button “Start>Run” and fill with regsvr32urlmon.dll at the “Open” filling box. Click “OK” to execute the order
After that you have to restart your computer to make sure all of setting is working at your computer. If the hyperlink has not still working yet at the “Office”, then you can add several additional orders through menu “Start>Run” by the below orders:
- regsvr32 Shdocvw.dll
- regsvr32 Msjava.dll
- regsvr32 Actxprxy.dll
- regsvr32 Oleaut32.dll
- regsvr32 Mshtml.dll
- regsvr32 Browseui.dll
- regsvr32 Shell32.dll
Processes / Steps using the above orders is as same as running the order of regsvr32 urlmon.dll

Build SEO with Identi.ca

When you are visiting Identi.ca you will find how people easily change their status. So don’t be surprise if you visit there, likely you have many friends. Based on the internet marketing experts, Identi.ca is categorized as do-follow website. As you know, do-follow site is useful to increase rank in Google. Let’s this do-follow site to get back link automatically. But it is important to know, blog/site you want to increase its back link must have RSS. And my be you w ant to know, what RSS is.

RSS ( Really Simple Syndicate) is a file having an XML format. According to Wikipedia, RSS is widely use by weblog community to publish . According to Wikipedia, RSS used widely by weblog community to spread summary of new article in journal , sometimes is also include complete article and even picture and voice. In around 2000, using of RSS was widely in many news publisher, included Reuters, CNN and BBC. RSS was used in almost all of news site and weblog, with various purposes including: marketing, press release, regular product report, or other activity needed periodic announcement and publication. No needed owning a web site like Band BBC to use this facility, but the important one is the applied CMS support this facility. To make it be automatically, you need to open twitterfeed.com which is usable to give feed RSS to Identi.ca and it is not really so difficult, open your website and take the RSS feed. Register to be a member of twitter feed.com and sign up to be a member of Identi.ca. Will you want to know how to make of it? Please read the following:

RSS
Usually all of CMS based on weblog will automatically have RSS feed. So don’t be confuse thinking about how to make ranks of XML in your blog. You only need to add feed behind it, and this is your RSS feed address. Remember every browser is different, if you open with Opera will different with Internet Explorer and also the others.

Identi.ca
As it can be find in twitter, will produce derivative product. Beside do-follow this site is also most be visited. The prove is, if you sign-in as a member, no need a long time, your timeline will full of new statuses . So, apply status in Identi.ca will give many advantages, besides increase back link, you will also get new friends.

Twitterfeed
This free service is many used by local and foreign publisher. Beside it is easier and shorten the time, man who just know internet world is assured can directly use this service.

Making Feed
Login to Twitterfeed, find button “Create New Feed” and write down your blog address including feed behind it. Click “ Test RSS Feed” and wait in whether it will be error or not. And then click “Continue to step 2”. Below Available Services, choose “Laconia” and type username and password. In the part of StatusNet Server you have to type Identi.ca as in this article is explain about Identi.ca. Click Create Service and look what happen ? Finish! If you read “Service Created Successfully ”, the feed is automatically be finished and ready to get back link anytime you post new article.

Rabu, 07 April 2010

Repair Damaged Inbox

File Outlook is not always in “fix” condition along the time. It can be, at the time Microsoft Outlook try to open it, it will appear an error message state your file is corrupt. If this condition be happened, please don’t be panic, and follow the below steps:

-Run Windows Explorer, then turn inside to folder C\Program Files\
Microsoft Office\Office 12\

-Find program with name of “scanpst.exe” and then run it

-After ‘Inbox Repair Tool’ window has opened, fill in your name including the path at the section “Enter The Name Of The File You Want To Scan”

-To conduct log file setting, click button “Options…..”

-The next step, click button “Start”. Inbox Repair Tool will immediately repair all of your damaged files

-If all of the files have been repaired yet, click “Close”

Return Icon at Desktop

Have you ever lost your Outlook icon? It might be happened at the past time, cause you wanted to have your desktop being cleaned, just then you delete this icon. On the other hand, at the time you need this icon, it is not available anymore. So how to recover this icon? Please follow these tricks :

-Open Registry Editor through “Run” window by clicking regedit

-Open key “Name Space’’ located below HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Desktop

-Make key with name of {00020D75-0000-0000-C000-000000000046}

-Below key {00020D75-0000-0000-C000-000000000046}, make new string with the name of Removal Message and with the value of “the outlook desktop Icon Provides special functionality and we recommend that you do not remove it)

Computer Trick : Compress Data Files

Try to see your inbox : heaped irregularly and will make your folder Inbox disorder. Almost it can be made sure you will just directly click e-mail’s file to blockade and delete this file. But eventually after the email data file be deleted, the file size is not decrease and still as big as the previous one. If you have experience like the above mentioned items, you must do the followed steps:

-Firstly, you need to see at the Microsoft Outlook Window to make sure
That Folder List has already appeared at the Microsoft Outlook window. If it has not been already appeared yet, you can show it by clicking trough View and navigate your pointer at the choice of Folder List.

-Soon after you see folder list at the Microsoft Outlook window, navigate
Pointer at the Outlook Today Personal Folders and right click to show additional menu

-At the additional menu, click Properties For “Outlook Today”…. and then
It will appear Personal Folders Properties window.

-Click “Advanced” button to show ‘Personal Folders’ additional window

-After the appearance of new window, click “Compact Now” button to compress data file inside your Personal Folders

You can do these tips now to ensure your data file is slim. You also can do this tip again if one week you have already insert new data and to make sure your Microsoft Outlook file data still be slim .

Minggu, 04 April 2010

Problem Solving if Our Computer Running Slowdown (part 2)

1. Page File

Windows page file is a temporary memory area used by computer to save and take data while the computer is running. If Page file is too small, operation system will not have enough space to do anything and can cause bad performance and appearance of error messages. Recommended: Upset Page file size. Right click in ‘My Computer’ choose option ‘Properties’. Click tab ‘Advanced’ then choose ‘Settings’ at part of ‘Performance’. Then click ‘Advanced’ and click ‘Change’ under ‘Virtual Memory’.

2. Hard Disk full filled by temporary File

When capacity of hard disk space under 10 percent , so it can be sure there will be a slowing down of computer performance dramatically. To increase it again , make bigger the rest of capacity with deletion of the unused old documents . Beside it, folder temporary file owned by Internet Explorer or other browser installed in computer can also be fulfilled by remain of files of the previous surfing. It can make browser loading be slowing down. Recommended : PC Washer (www.pc-washer.com) can help solve the problem.

3. Broken Operation System

If it is not kept carefully, each of operation system can be malfunction. Commonly, if so reparation can be done using CD or system installation DVD itself. Depend of the computer producer , sometime at the packaging of computer accompanied with CD recovery, though sometime CD recovery is also a re-installation of files owned by operation system. Recommended: Reinstall the computer or use CD recovery.

4. Hijack browser

Sometimes, browser appear stranger main page. We will se pop-up continuously. Hijacker can install , replace or take over our window to the internet. Browser hijack itself is categorized as same as spyware, adware, malware, and Trojan etc. The differentiation is, this attack is directly strike to the browser’s user whom the computer is hijacked. The user itself is not realize when this bad program installed silently to his computer. They also not realize that system or browser setting is changed. Recommended: Download Hijackthis (http://www.freeantivirus.com/hijackethis) to examine the computer from the attack of hijack browser.

Problem Solving if Our Computer Running Slowdown (1)

When our computer was bought first, we found it had a good running, programs were run smoothly, with an efficient performance. Working with the computer, user could surf in the internet and played games without any problem. But from time to time your computer was going to be slowdown. The below factors affect performance of your computer being bad.

1.Spyware
Spyware is a dangerous program silently stick in windows registry and main system file is included a main factor causing PC’s performance slowdown. These applications commonly installed with the computer’s user unknown. For example at the time the owner try ‘free ‘ application. Spyware is also appear when we visit websites containing wicked script. These spyware programs surely need to be deleted as soon as possible in order to our computer back to the original performance before they destroy system files. In some cases they can be deleted manually with edit registry and file system. But it is difficult to exam all of windows registry one by one. The easy way is use automatic spyware deletion software. Recommended : download spyware doctor ( www.pctools.com/spyware-doctor) to run free spyware examination.

2.Virus.
Similar to Spyware, virus can destroy working system and limit performance of the computer. Commonly virus coming into the computer through the infection email, or instant message. By the way, they can also installed through application or file taken from file sharing server, crack software, or unknown websites. Virus deletion manually is difficult enough and is rarely to success , exception for you who are usually do this job. It is recommended for the user to run antivirus program. Recommended: use program like Kaspersky Internet Security (www.kaspersky.com) or Norton 360 (www.symantec.com/norton/360)

3.Broken Windows Registry
Broken registry or overload can be a cause of down of the PC’s performance, including very slow start up, slow Windows start up, long time Windows shutdown process, until computer can not active after come in sleep mode, etc. Cleaning, slimming, and optimize Windows registry can give performance increasing dramatically to the computer. Especially at the start up and shut down . Recommended: Download Registry Mechanic (www.pctools.com/registry-mechanic) to clean up registry.

4.Fragmented Hard Disk
Because of the age factor of the PC, position of the files is spread, fragmented and saved in random place in hard disk. This called fragmentation. Actually Windows has software help to solve fragmentation in Windows. Recommended: Run My Computer. Click right in Drive “C”: choose ‘properties’. Choose tab ’Tools’ and ‘Defragment Now’ and then follow the next instruction appeared on the display.

Kamis, 01 April 2010

Four Effective Ways to Prevent Your Computer

May be one of us had ever an experience like this, we as a reporter, students, employee was faced to a very tight deadline in making report and we worked with our computer, suddenly our computer was hang, cracked and could not be opened because of virus attack. While we had to finished the task in that day. To anticipate it please find below preventive steps:

1.Think twice before install a software
Commonly people assume viruses only attack computer via internet or flash disk. But actually other media like compact disc (CD) can also be a virus carrier. Because of it, it is better for you not to install any unknown software CD. To anticipate it you used to regularly back-up all of important files to others media. It is useful if sometime virus attack your computer you still have reserved data

2.Use newest security software
To anticipate virus, it is better for you to protect your computer with three kinds of primarily security software with automatic regulation. They are Antivirus to prevent virus, Antispyware to prevent spyware, and Firewall to block hacker attack and outside connection. For you who want to try the free version, try to download from AVG antivirus, Adware or Zone Alarm. Don’t forget to make sure all of these antivirus are new version or at least you have already update them. Beside it please run scanning feature regularly

3.Be careful in opening email attachment
Email has been an effective way to make communication today. Not only in work / office environment , email can also be facilities to send files filled by jokes. If you often use email, it will be better for you to be careful in opening file attachment, mainly if the email comes from unknown sender.

4.Make special account for guest
If someone else often uses your computer, its highly recommend for you to anticipate it with making special account for guest, with certainly limitations determined by you. This is to anticipate someone with unintentionally insert virus-attacked flashdisk or maybe he install program attacked by virus.

Tips to Save in Twitter

Growing of social network like twitter is very rapid, but on the other hand there are some threaten coming from virtual world. One of the threaten might be happened is Phising , where un responsible parties stole private user’s data hiding as a friend of the user. Only in four years from its birth, twitter population increase rapidly all of the world. This increasing made Twitter be soft target for criminals in virtual world. So how to use twitter safety ? Please find tips as per follows :


1.Limit discussion Twitter make easier for the user to tweet about location or anything about their activity. With their unknown, their account is a public account (not limited or saved) so everyone can see their tweet.

2.Be careful in open the link
Be careful in opening the link. People usually use shortened URL feature at Twitter, so it is difficult to know how safety sites will be opened.

3.Keep conscientious
Be conscientious to any activity suspicious activity at timeline or inbox , primarily to spammed look like messages

4.Think before Tweeting
Your tweet can be read by people all over the world. Even after deleted, tweet still can be found using search engine. To anticipate it, please think what you want to write carefully. Problems because of tweet had been happened to people, including public figure, common user until actress

5.Do not too believe
You don’t know who your follower is, so don’t make a friend for someone you don’t understand or you don’t know at all

6.Password information
Use different password for each social network account, so if you close your social network account, you can easily erase your email account.

Guides to Buy Gaming Laptop

PC gamers are very critical in playing a game, they want everything provided perfectly. Graphic card having ability to render game so make it seen hyper-realistic, bombastic audio system until various supported tools so make playing game be very attractive. So why choosing gaming laptop, sure gamers are also need mobile. They want to play Call of duty 4 in campus, coffee shop, or airport. They also want to upload Spore character or download one of map in Half Life, and access Warcraft or Warhammer Online anytime. Portability, connectivity, easier using laptop with a desktop powerful will make user get mobile gaming experience as attractive as using full size desktop at home. Below are important points in making decision to buy a laptop gaming.

1. Processor
Dual core processor is minimal requirement in playing heavy games. In fact, many newest games are designed to work in Quad Core processor. It is not a wonder if vendors completely their products with most powerful processor owned by Intel today, Intel Celeron i7 and i5.

2.Video Card
Video Card or Graphic Card is important to make a game seemed realistic. Lighting quality, explosive, landscape, and action clips are depend of graphical card using. It look like a simple, but these ornament s will make playing game more attractive. Now vendors try hard to re-size standard dimension of Video Card in desktop PC being smaller. Common gaming laptop use video card from 512 MB until 1 GB. Even in new game like Far Cry 2 and Fallout 3 have already used dual video card in one way.

3.Display
Size, Dimension, and resolution are also a consideration in buying gaming laptop. Today, vendors provide 15,17,18 and 20 inch for gaming laptop. Actually, bigger in display will make more attractive in using. Anyway if user try to find a laptop loadable in backpack, the 17 inch in size will be a best choice, as size doesn’t mean better if user try to carry his laptop everywhere.

4.Hard Drive
Game will make photo, file, music, or video looked like smaller in HDD computer. Imagine that, a game will consume 15 GB in HDD. Owned a bigger blank space in HDD really will increase performance and load times. Please make sure not to buy a laptop with less than 200 GB and you use HDD with a good drive speed, a responsive 7.200 RPM

5.Guarantee
A High end gaming laptop is clearly not sold with a cheap price, so usually the manufacture will give one year guarantee to cover all failure in hardware. It is recommended to find choice to make longer in guarantee

Minggu, 28 Maret 2010

Artificial Intelligence (AI) will Make Computer Can Build Communication to Human

In television, you might ever see Dr. Stephen Hawking talked to his students. This Physician famous with his black-hole theory doesn’t have ability to create sound coming from his mouth anymore, by the way he still can talking about something to others, thanks to speech synthesizer technology. Hawking’s speech synthesizer machine is really complex enough. This machine is not only produce sound, but also catch input from the eye reflection of the doctor. It is also be commonly found in voice command application planted in advanced smartphone combine speech organizer with speech synthesizer. The most simple synthetic speech application is really can be found in every PC with Windows Operation System. If you click WinKey + U at the keyboard, Windows will activate Utility Manager, and inside it there is Microsoft Narrator application. This application can be read in every window you are activate, including the button inside it. Or maybe you are ever install Microsoft Reader application at PC. This application purposed to .LIT file is also completed with the ability to translate text to be sound (text-to-speech), and this is as a sample of speech synthesizer technology.

Working Flowchart

As in speech recognition, the application design of synthesizer speech is not only done by information technology experts, but also included linguistic experts. To understand working system of speech synthesizer, let we start from the other name: text-to-speech , means that converse text to be sound. Now, we have got two elements in speech synthesizer, they are text as an input element, and sound as an output element. Process happened between this input and output is called manipulation process. In speech synthesizer, process is divided to two big parts: front-end and back-end. The front-end part has two main functions, first is to converse the raw text filled by symbols like number and abbreviation to be readable letters. As a sample, the first task of front-end part is to converse 1 become one, btw become by the way, etc. This process is also often called text normalization, pre-processing or tokenization. This front-end part is then give phonetic transcription for each words, separate it, and mark text to inside prosodic (rhythm , intonation) units, like phrase (units of words function as one syntactic unit), clause , and sentence. This process is also called text-to-phone-me or grapheme-to-phoneme . Phonetic transcription and this information is then combined and build symbolic linguistic representation which is an output from front-end. Back-end part, is often called synthesizer itself, is then converse this symbolic linguistic representation become sound. This is a description of working flow a speech synthesizer application or text-to-speech.

Synthesizer Technology

The most important quality from of speech synthesizer application is how “natural”, and “intelligible” output resulted. Natural, means that how close the sound resulted from speech synthesizer application compare to a human sound. While intelligible is how easy this output be understood by human. All speech synthetic application try to produce natural output and intelligible in one way. Until now, there are many technology to generate this synthetic sound wave. The most two technology used is concatenative synthetic and formant synthetic. These two technologies have each advantages and disadvantages. The first technology, concatenative synthetic base on links of recorded sound segments . Commonly will produce synthetic sound which are most natural. Anyway, the differentiation between recorded natural sound segmentation of sound wave or a is often produce disturbing sound. Similar with sound of queue number announcement in a bank or a sound of ‘call center “ from phone cellular operator which are state the rest of pulse and active period your phone cellular. The second technology, formant synthetic is not use human sound sample, but it produce synthetic sound use an acoustic model. Parameters like basic frequency, sound strains and noise level is varies from time to time to create synthetic sound wave. Most of application based on this technology produce synthetic sound (not natural) like a robot sound. Remembering the limited of these two technologies in producing synthetic sound, we have to be more patient waiting in further development in several next years or decades.

Sabtu, 27 Maret 2010

Android is Predicted Will Take Over Smart Phone

Today we know commonly there are two kinds of smart phone people usually used, BlackBerry (BB) with its variant and iPhone. But recently we are surprised by the releasing of Android technology created by Google. Believe it or not, Android technology actually has some advantages compared to BB and iPhone. In the next two or three years, “open source” operational system like Android released by Google is predicted more powerful and will cover most of smart phone market.

Android vs iPhone

Can Android overcome iPhone? Technologically, it is believed that at least Android can make such a balancing many system application owned by iPhone. Android has advantages coming from the providing of free and various applications, so customer has more handset functions. But basically these two labels of phone cellular have different point of view and philosophy in the application created by their vendor, and automatically market receiving to them is also will be different. Since it was created by the vendor, iPhone did a dictator policy to the application software spreading system. Apple only permit applications released to the market after passing serial tests and sometimes even passing to tight sensors. On the other hand, Android will fully release the software development to each developer, with almost all of spreading mechanism are free, but there are small amount of them are paid. Benefit of the paid system software will also be give to the developer. As the software code provided as open-source, so everyone can create, change, and develop this program, so the developer only adjust it as it is needed. Many iPhone customers use drawing zoom feature for the graphical purpose or only to read comics, but at the time of zooming process successfully done, resolution of the picture will not follow it so the picture quality will not be maximal. While at the Android technology, beside doing a picture zooming, the resolution appeared is also adjusted to the zooming level. It will possible to the picture quality created will be more optimal. For these reasons ‘Time’ magazine consecrate Motorola Droid Milestone as The Best Gadget 2009, while iPhone 3Gs only placed in the fourth rank.

Android vs BlackBerry

People analog BB as a passenger car having ability to carry many passengers, with the free feature called BlackBerry Messenger (BBM). This is the advantages of BlackBerry compared to the Android that don’t have messenger feature as good as BB. But Android is like a Humvee or Land Rover car, owning more durable technology although has a limited in an amount of data space, different with BB which relatively sensitive to data overload so the handset often hang. Although BB can load more amount of data, can send several pictures in one way, but from time to time it’s processor ability will slow down. It will make the user has a difficulty in accessing other features in one time, or in other time when free space is going to be limited. While, although Android doesn’t have advantages like the above features, the ability to access internet with high speed made this gadget can access everything without saving it in a hardisk. Anyway , appearance of BlackBerry so far has been giving many benefit to the user. Accept of the above advantages, BB is also slowly but sure change the people habit, if before this BB released to the market people access email via computer, download it, and answer through Microsoft outlook, since the arising of BB everything is done more simple, and be easier as all of this is done through only one telephone cellular gadget. But for the next time Android is also predicted will hold important position similar to the BB. If BlackBerry make people easier to access e-mail via telephone cellular, in the future Android is believed make people usual and easier surfing in the internet via telephone cellular, not via computer.

Router: Makes internet connection being easier and cheaper



People around the world are usual using internet to make social interaction, business connection, searching any information about housing, healthy, travelling, science,  education, sport  and many other unlimited information provided in the internet. A few years ago internet was an expensive thing to most of people, but today it is going to be more cheap and cheaper to access internet. One of the important  computer’s  accessories used today is modem router.
Router Wi Fi (Wireless Fidelity) is a gadget to conduct wireless computer network traffic . But today many routers have a double function also as a modem, and called Modem Router   . So, this modem router  can also used directly to connect several computer to the internet, while common router Wi Fi still need connection to modem to access internet. Nowadays almost all of the computer shops provide router Wi Fi . Modem router Wifi can be a connection bridge to a virtual world or internet protocol  and also can be used to manage wireless network or Wi Fi. Most  of this gadget  also have a security function such as firewall.
In markets, now the price of this gadget is being cut until 50% compared two years ago. Commonly modem  router is more expensive than router only, but the brand is also determine the price. In the past time if we  wanted to get an internet connection , each home in a area had to install modem by themselves. But now using router completed  by Wi-Fi technology they need not to install their modem. Also if in a family in a house father, mother, son, daughter can use each computer/notebook connected to internet by using only one modem.