ZTe Blade ( New Website )

ZTeBlade

This is new website for users or not ZTe Blade , We present a news for Android software, tricks and more .

Don’t forget if you like us please make a like on our Facebook here

Don’t Forget translate our Webpage ( Portuguese )  to your language

If you have a especial software send to us , and we share Sorriso

Linux Mint 12

lisa_light

The purpose of Linux Mint is to produce a modern, elegant and comfortable operating system which is both powerful and easy to use.

Started in 2006, Linux Mint is now the 4th most widely used home operating system behind Microsoft Windows, Apple Mac OS and Canonical's Ubuntu.

Some of the reasons for the success of Linux Mint are:

  • It works out of the box, with full multimedia support and is extremely easy to use.
  • It's both free of cost and open source.
  • It's community-driven. Users are encouraged to send feedback to the project so that their ideas can be used to improve Linux Mint.
  • Based on Debian and Ubuntu, it provides about 30,000 packages and one of the best software managers.
  • It's safe and reliable. Thanks to a conservative approach to software updates, a unique Update Manager and the robustness of its Linux architecture, Linux Mint requires very little maintenance (no regressions, no antivirus, no anti-spyware...etc).

Machine Tested : EEEPC 1001PX | 2 GB DDR2 | 500 GB HDDstarstarstarstarstar

Download : here

Inês Godinho Fernandes – Missing

A jovem da foto é a minha filha Inês Godinho Fernandes. Está desaparecida desde o dia 26 de Outubro de 2011. Na altura estaria na zona de Campo de Ourique/Rato/Marquês de Pombal.

Peço a vossa melhor atenção para que façam circular este e-mail com as fotografias da minha filhota de forma a ser visto pelo maior número de pessoas possível.
Caso tenham alguma novidade agradeço, por favor, que contactem os números indicados neste e-mail.

Muito obrigada pelo vosso tempo. Conto com a vossa colaboração.

Cumprimentos

image001image002

Tel.: 21 383 89 53

Móvel: 969 039 732

e-mail: cidaliag@espart.pt | cidalia.godinho@gmail.com

Samsung gives enjoyment to fans of the Apple

When a brand decides to attack another through humor, the risk is always great, but this is perhaps the best advert for the Samsung ever made, called "The Next Big Thing" and basically is a shot squarely in the fanboys Apple's. Comparative advertising is banned in Portugal (and throughout the European Union), so the video you will see should not be viewed in Portuguese television.

In this video we see people in line waiting to buy the new iPhone and read blogs in the same problems, then a person appears to Galasy S II.

It's very funny, but the reality is this, I never saw anyone in line to buy a Samsung, unlike the Apple products ...

Oskar the Blind Kitten and His First Toys

The Oskar is a kitten that was born with a malformation in the eye, becoming completely blind. He was adopted and the following day received several balls with bells inside, in order to play. Due to the small noise, the kitten can see and play with balls like a cat "normal." On YouTube, the owners wrote that they feel blessed to have Oskar, a cat happy and inspiring.

Not all people who care for animals in this way and that would give an opportunity for a cat with a problem like this, very beautiful and an attitude that should be shared.

JW Player [ Flash Embebed Html ]

longtailvideo

Our Setup Wizard renders the code you need to implement a specific JW Player 5 setup. It’s also a useful tool to experiment to see what's possible with the player. Roll over a variable to see its tooltip or check this page for more explanations. To set up a JW Player 4 configuration, please use the previous wizard.

He returned to piracy e-mails scientific

 

InternetA few days before the UN climate summit in South Africa, as happened on the eve of the climate summit in Copenhagen in 2009, a group of internet hackers sent to a file with 5000 private emails of some leading researchers at the University of East Anglia, UK.

At the time filtration media made a huge noise that turned out to christen the controversy over the content of e-mails as "Climategate", making a pun on words with the famous case of "Watergate," which ended with the mandate of Richard Nixon in the U.S..

Now hackers are breaking the law again for allegedly stealing a lot of emails and make them publicly known through four pages of Internet skeptics of climate change. The information can be downloaded from a Russian server for some time, but during the afternoon of Tuesday the site was blocked and not allowed access to information.

As in the previous edition, the post match discussions of researchers, among which stand out Phil Jones of East Anglia, and Michael Mann of Penn State University (USA).

The University of East Anglia itself says from a statement "there is no recent evidence of a violation of our system. Check if the mails are authentic, the volume of material makes it impossible to confirm that today they are. These emails appear to have been retained after the data theft and e-mails in 2009, to be released at a time intended to cause a maximum effect in the upcoming international talks on climate. "

"It seems to be a carefully planned attempt to reignite the controversy over the science of climate change, although science has been claimed by three separate and independent investigations and a large number of studies, including the last performed by the group surface temperature of the Earth Berkeley ". "As in 2009, extracts the e-mails were taken out of context."

SaveVideo.me

savevideo.me

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Download video from Youtube, Facebook, Vimeo, Megavideo new, Metacafe, Dailymotion, Break.com, Sevenload, Current.com easily!

LEGO Universe ends in January

 

 

LEGO is preparing to put an end to LEGO Universe, an MMO based in the world of toy blocks, launched in 2010.

The end of the game implies that 115 jobs will be terminated.

Jesper Vilstrup, LEGO, eslareceu the reasons for the closing of title.

"We now have 2 million players in LEGO Universe, and we have a very positive response from our users. Unfortunately, we were unable to build a business model in satisfying our audience and as such have decided to end the game."

The fate of LEGO Universe will not influence other LEGO videogames, according to Mads Nipper, also from LEGO.

"The development of our digital offerings continues to be an important element of our strategy. Remos more than 20 million visitors each month to LEGO.com, LEGO and video games are among the most sold games for children, with more than 60 million units sold in the last five years. Through our experience we have gained a valuable perspective and have a solid foundation for future digital titles. "

Men are more at risk than Women on Facebook

cyber-attackMen are more likely than women to be deceived and fell into schemes of data theft when using social networks like Facebook and Twitter, concludes a study on online safety carried out by BitDefender.
The reason is related to greater willingness on the part of males to take risks during the use of such platforms, explains the solution provider against computer threats.
"Men are more likely than women to accept friend requests from strangers, sharing your location, ignoring privacy settings, leave your accounts for all to see and avoid reading the privacy policies on social networks," revealed the analysis based on surveys of more than 1,500 people.
According to the study, while 64.2% of women always reject friend requests from strangers, only 55.4% of men do. About 24.5% of men allow their profiles on social networks to be accessed by anyone, when the same thing only was the rule among 16% of respondents were female.
Regarding the sharing of data on the geographical location of users, gender differences are less marked, with 25.6% of men admit to sharing this information and 21.8% of women do the same.
According to experts, the greatest lack of care recorded among men may increase the risk of users becoming victims of attacks from spammers, data theft and other fraud. It also grows the likelihood of being sent to sites infected with malicious software, they add. Still, all said they had an antivirus installed on your computer, notes the company.
The 1649 surveys conducted in the United States of America and the UK, also revealed that American men are more at risk than the English and that the general tendency is to become more cautious with age.

% avalaible but not charging ( Trick )

 

Green_Battery

Do you have a problem in your laptop about the battery !!!

So make this trick ( We resolve our battery in 3% )

  1. Shut down the laptop with the battery in and plugged in.
  2. Remove the battery.
  3. Reboot the machine.
  4. Wait for ( XP / Vista / 7 ) to come up and show the power icon.
  5. Reinstall the battery.

if result , please comment us

Top 15 Ways to Extend Your Laptop’s Battery Life

 

laptop

Laptops tend to lose their charm quickly when you’re constantly looking for the nearest power outlet to charge up.  How do you keep your battery going for as long as possible?  Here are 15 easy ways to do so.

1. Defrag regularly -  The faster your hard drive does its work – less demand you are going to put on the hard drive and your battery.  Make your hard drive as efficient as possible bydefragging it regularly. (but not while it’s on battery of course!) Mac OSX is better built to handle fragmentation so it may not be very applicable for Apple systems.

2. Dim your screen – Most laptops come with the ability to dim your laptop screen.  Some even come with ways to modify CPU and cooling performance.  Cut them down to the lowest level you can tolerate to squeeze out some extra battery juice.

3. Cut down on programs running in the background.  Itunes, Desktop Search, etc.  All these add to the CPU load and cut down battery life.  Shut down everything that isn’t crucial when you’re on battery.

4. Cut down external devices – USB devices (including your mouse) & WiFi drain down your laptop battery.  Remove or shut them down when not in use.  It goes without saying that charging other devices (like your iPod) with your laptop when on battery is a surefire way of quickly wiping out the charge on your laptop battery.

5. Add more RAM - This will allow you to process more with the memory your laptop has, rather than relying on virtual memory.  Virtual memory results in hard drive use, and is much less power efficient. Note that adding more RAM will consume more energy, so this is most applicable if you do need to run memory intensive programs which actually require heavy usage of virtual memory.

6. Run off a hard drive rather than CD/DVD - As power consuming as hard drives are, CD and DVD drives are worse.  Even having one in the drive can be power consuming.  They spin, taking power, even when they?re not actively being used.  Wherever possible, try to run on virtual drives using programs like Alcohol 120% rather than optical ones.

7.  Keep the battery contacts clean:  Clean your battery’s metal contacts every couple of months with a cloth moistened with rubbing alcohol.  This keeps the transfer of power from your battery more efficient.

8. Take care of your battery – Exercise the Battery.  Do not leave a charged battery dormant for long periods of time.  Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge. (Discharing is only for older batteries with memory effects)

9. Hibernate not standby – Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn’t save anywhere as much power as the hibernate function does.  Hibernating a PC will actually save your PC’s state as it is, and completely shut itself down.

10. Keep operating temperature down - Your laptop operates more efficiently when it’s cooler.  Clean out your air vents with a cloth or keyboard cleaner, or refer to some extra tips by LapTopMag.com.

11. Set up and optimize your power options – Go to ‘Power Options’ in your windows control panel and set it up so that power usage is optimized (Select the ‘max battery’ for maximum effect).

12. Don’t multitask – Do one thing at a time when you’re on battery.  Rather than working on a spreadsheet, letting your email client run in the background and listening to your latest set of MP3′s, set your mind to one thing only.  If you don’t you’ll only drain out your batteries before anything gets completed!

13. Go easy on the PC demands – The more you demand from your PC.  Passive activities like email and word processing consume much less power than gaming or playing a DVD.  If you’ve got a single battery charge – pick your priorities wisely.

14. Get yourself a more efficient laptop -  Laptops are getting more and more efficient in nature to the point where some manufacturers are talking about all day long batteries.  Picking up a newer more efficient laptop to replace an aging one is usually a quick fix.

15. Prevent the Memory Effect - If you’re using a very old laptop, you’ll want to prevent the ‘memory effect’ – Keep the battery healthy by fully charging and then fully discharging it at least once every two to three weeks. Exceptions to the rule are Li-Ion batteries (which most laptops have) which do not suffer from the memory effect.

Bonus Tip #1: Turn off the autosave function.  MS-Word’s and Excel’s autosave functions are great but because they keep saving regular intervals, they work your hard driver harder than it may have to. If you plan to do this, you may want to turn it back on as the battery runs low. While it saves battery life in the beginning, you will want to make sure your work is saved when your battery dies.

Bonus Tip #2: Lower the graphics use. You can do this by changing the screen resolution and shutting off fancy graphic drivers. Graphics cards (video cards) use as much or more power today as hard disks – Thanks Andrew

Update 7/7/07: Bonus Tip #1 to give caution about turning off autosave, tip #8 to change information about discharging batteries – thanks to all who pointed it out. Added Bonus tip #2, Tip #1 to add in clause in regards to Mac OSX, Tip #1 about the spinning of hard drives – thanks to all who pointed it out

Chromebooks for Business & Education

Samsung-and-Acer-ChromebooksFast, intuitive, and easy-to-manage computers designed to keep data and users safe while delivering all the power of the web.

Business: Quick, easy access to the tools employees need, all through the browser. In the office and on the go, Chromebooks for Business keep work safely synced, while streamlining IT and eliminating tedious maintenance. Learn more [pdf]

Education: Spend more time teaching and learning, and less time managing technology. Chromebooks for Education bring the richness of the web into classrooms and help schools put more computers into the hands of students. Learn more[pdf]

 

Google Chrome to Phone Extension

With this extension, a button is added to Google Chrome that lets you send direct push on links, maps, text and phone numbers that are selected for your Android device. You can also right-click on a link or selection in a web page and send it to your Android device.
You also need to install Chrome to Phone application on your Android phone. You can download the application on the Android Market (search for "Chrome to Phone"). You need a cell phone with Android 2.2 ("Froyo") or later.

 

Top 10 Reasons To Root Your Android Phone

dffdd111_thumbPeople say there are always two classes of technology users; those who take and use technology the way it is brought to them, no questions or complaints, while others who want to indulge deep into the very essence of what’s being offered, and want to empower themselves with everything to take the maximum out of that technology. This rule of thumb holds true for mobile phones as well. The power user crowd has always been different from the average.

If you want to skip the details and get straight to the rooting process, feel free to head over to our guide on how to root your Android phone or tablet device.

Back from the old Windows Mobile ROM cooking days, people have been questioning limitations of every device and finding workarounds. When iPhone was launched back in 2007, the power user (a.k.a hackers and geeks) side of the users quickly realized the true potential the device held, and the cruel software limitations that Apple had sealed it with. What became ‘Jailbreaking’ on iPhone was quickly translated to other platforms as well, and when the world saw the first Android back in 2008, the same concept got adapted there too.

phone status

Android, despite being open source, still did not give a user complete control over the device. This laid basis for many potential abilities remaining dormant, and subsequently Android devices began to get ‘rooted’. Now this begets the question, why root? With so many Android-based handsets out there now, this question has become even more important.

Rooting essentially means gaining root-level access to your device. Those who have used Linux OS will easily understand, but for users like me who have been loyal to Microsoft’s operating system all their lives, this means that by rooting your device you get complete control over what should remain in the device and what not. Rooting means you are the master and in control, not to mention the fun of it.

Hence, here’s a list of my top 10 reasons (in no particular order) that I consider worthy of rooting your device for.

Performance Update

There are just too many flavors of Android in the market, with every OEM or carrier adding their own personalization and customization to devices. While they may appeal to some, they do not let the device take full advantage of what the hardware is capable of. With root access, you can actually tweak the OS to behave entirely differently, and with infamous developers like Cyanogen working on custom ROMs and mods, people have actually reported performance boosts. Take the G1 for example. The device never got 2.1 officially, but thanks to Cyanogonmod G1 owners can not only the tastiness of Eclair but also report much better performance than the stock ROMs.

Hardware/Software Interaction

Most Android devices come with hardware that is fairly heavily capable, yet the OS limits them and becomes the bottleneck. By rooting, you actually remove the bottleneck and hence can take full advantage of your beloved Android. For example, overclocking a device’s CPU is fairly simple and rather safe thanks to many third-party apps, yet the OS does not allow it natively, and hence overclocking can only be done with a rooted phone. Or suppose you want to use your mobile’s LED as flashlight (HTC Desire, anyone?) but cannot because HTC won’t allow it? Rooting will allow you to bypass this limitation!

APPS2Sd

One of the most talked-about feature (or disadvantage) of any Android device is the limitation where you can install applications only in the phone’s internal memory and not the SD card. While Google may reason that SD cards are slower in general and cannot run apps as effectively as internal memory, fact of the matter is that most Android devices do not come with massive internal storage spaces, and hence greatly limit the number of applications that can be installed at a time. With rooted devices, you can use Apps2SD, which will copy ALL your applications to a ext2/3/4 formatted SD card an will also store future builds in card. Freedom to choose!

Unavailable Features

When Google brought forth the Nexus One, one of the aesthetically pleasing features was Live Wallpapers. Unfortunately, most of the Android phones vary so greatly, that despite the hardware being compatible with Live Wallpapers, the software won’t allow them to run. My Samsung Galaxy Spica is a perfect example. The handset’s hardware can easily handle Live Wallpapers, yet Samsung chose to exclude it. Thanks to rooting, you can have them on your device as long as hardware allows.

EXTRA APPLICATIONS

Folks at XDA-Developers have created a wonderful application, SetCPU, which allows easy overclocking of various Android CPUs. However, due to the permissions required for such level of operation, a superuser access is necessary, and that can come only from a root access. This is just one example. The internet is flooded with many such applications that remain useless unless you have rooted your phone.

Multitouch

If you have ever typed on an iPhone, you would always remember the smooth, fast typing action that you achieve on that amazing keyboard. Or if you can recall that pinch-zoom actions. These are the products of a multitouch screen.

While most Androids can deal with multitouch, various manufacturers have decided to omit it in their devices. This is not always because the hardware is incapable, but because the software does not let it happen. This becomes even more irritating when you see that HTC Hero had multitouch input support back from the Android 1.6 days, but more modern more powerful 2.1 devices never got it (again, my Spica).

Thanks to rooting, it has become possible to get multitouch input in various devices, most notably the G1.

WIFI AND Bluetooth Tethering

After having rooted your device, you can also use WiFi or Bluetooth tether to share your cellular data connection with your laptop or PC. The application works with ad hoc connections and will get you up and running online on your laptop in no time. Similarly, tethering can also be achieved over a Bluetooth connection. You may check out the app in question here, but remember, rooted-phones only!

Better Keyboard

I have expressed before and I will say again; I do not dislike the Android keyboard. However, it just isn’t enough. HTC, with their SenseUI, brought to their devices the revered HTC IME keyboard which had predictive text input, and made typing a breeze. Since it was an HTC only keyboard, people with phones from other manufacturers were left blindfolded. Again, the root-developer community ported the keyboard for all platforms, making possible for all rooted phones to take advantage of the better input method.

APPS From Other Builds

Almost every build of Android OS differs from others when it comes to default apps. G1 hasn’t got the same stuff as myTouch 3G; Nexus One differs from HTC Desire. What’s more, these applications from one build cannot be ported to another. Hence you are stuck in more than one ways. However, with custom ROMs, the developers usually gather the best of the lot in one complete package, that would leave a user satisfied, not craving. And to get these custom ROMs running on your phone, you need root.

Because You Can!

I am serious, I consider this a reason. You have a powerful, capable device that you have paid for. You should have the right to modify or change it in any way you like. The device is your property, and you would naturally want to see it working at its maximum potential. Hence the point of rooting.

With the latest Froyo announcement at Google’s 2010 I/O conference, most of these reasons may become useless. But Froyo will not be pushed for all devices, at least not immediately. While it will aim to reduce the fragmentation in Android division, until it happens, a rooted device is the only option you have.

Last, please do remember that rooting voids your warranty. Although you can always go back to a stock version of the OS, it is risky business, hence proceed with caution.

Start rooting

Now that you have learned all about what rooting is and why you should root your phone, head over to our guide on how to root your Android phone or tablet device and start rooting!

Amiga 500

FileAmiga500_system

The Amiga 500 - also known as the A500 (or its code name 'Rock Lobster') - was the first “low-end” CommodoreAmiga 16/32-bit multimedia home/personal computer. It was announced at the winter Consumer Electronics Showin January 1987 - at the same time as the high-end Amiga 2000 - and competed directly against the Atari 520ST. Before Amiga 500 was shipped, Commodore suggested that the list price of the Amiga 500 was 595.95 USDwithout a monitor. At delivery in 1987, Commodore announced that the Amiga 500 would carry a 699 USD list price.

The Amiga 500 represented a return to Commodore's roots by being sold in the same mass retail outlets as theCommodore 64 - to which it was a spiritual successor - as opposed to the computer-store-only Amiga 1000.

The original Amiga 500 proved to be Commodore’s best-selling Amiga model, enjoying particular success in Europe.[1] Although popular with hobbyists, arguably its most widespread use was as a gaming machine, where its advanced graphics and sound for the time were of significant benefit.

 

more information here

Android App Turns Smartphones Into Mobile Hacking Machines

Dangerous hacks come in small packages.

zukantiOr they will, perhaps, when an app called Anti, or Android Network Toolkit, hits the Android market next week. The program, which Israeli security firm Zimperium revealed at the Defcon hacker conference in Las Vegas Friday and plans to make available to Android users in coming days, is designed for penetration testing–in theory, searching out and demonstrating vulnerabilities in computer systems so that they can be patched. Anti aims to bring all the hacking tools available to penetration testers on PCs to smartphones, with an automated interface intended to make sniffing local networks and owning remote servers as simple as pushing a few buttons.

“We wanted to create a penetration testing tool for the masses, says Itzhak “Zuk” Avraham, founder of Tel-Aviv-based Zimperium. “It’s about being able to do what advanced hackers do with a really good implementation. In your pocket.”

Anti, a free app with a $10 corporate upgrade, will offer a wi-fi-scanning tool for finding open networks and showing all potential target devices on those networks, as well as traceroute software that can reveal the IP addresses of faraway servers. When a target is identified, the app offers up a simple menu with commands like “Man-In-The-Middle” to eavesdrop on local devices, or even “Attack”; The app is designed to run exploits collected in platforms like Metasploit or ExploitDB, using vulnerabilities in out-of-date software to compromise targets.  

For now, the demonstration app Avraham showed me was equipped with only a few exploits: One aimed at a bug in Windows–the same flaw exploited by the Conficker worm in 2009–another targeting default SSH passwords in jailbroken iPhones, and a third exploiting a vulnerable, older version of Android. Zimperium has also built a Windows trojan that allows Anti to perform automated commands on hijacked machines like taking a screenshot, ejecting a CD, or opening the calculator, a common penetration-testing demonstration.

Even in its current form, the app raises the possibility of dangerous, stealthy attacks. A hacker could, for instance, walk into a coffee shop or a corporate office with his phone and start sussing out machines for data theft or malware infection. But Avraham says Zimperium will ask users in its terms of service to limit their hacking to “white hat” penetration testing.  

“Hacking is not for the chosen few,” reads one description in the app’s documentation, formatted in Star Wars-style scrolling text. “Anti is your perfect mobile companion, doing it all for you. Please remember, with great power comes great responsibility. Use it wisely.”

Penetration testers who saw the app at Defcon were impressed. “It’s just sick,” says Don Bailey, a researcher with security firm iSec Partners. “The way it populates the screen with vulnerable targets…it’s really elegant.”

Another professional penetration tester for a defense contractor firm who asked that his name not be used called the app a “quick and dirty Swiss army knife for mobile pen testing.” “It’s so polished it’s almost like playing a video game,” he says, comparing it to penetration testing suites that cost thousands of dollars.

With its sheer simplicity, Anti’s impact could be comparable to that of Firesheep, a proof-of-concept tool released in October of last year that allowed anyone to easily snoop on devices on unsecured wi-fi networks that connected to unencrypted web pages. That tool was downloaded more than 1.7 million times, and no doubt used in some instances to spy on web users unawares. But it also helped inspire both Twitter and Facebook to encrypt traffic to their site and prevent such eavesdropping.

“People might use it in dangerous ways,” Avraham says with a shrug. “I really hope not. But I know this might be the risk to help people increase their security, and that’s our goal.”

anticredit_00

anticredit_01

anticredit_02

Website : http://www.zimperium.com/Android_Network_Toolkit.html#anti-apk

Download : http://box2me.dyndns.org/Android/Applications/Anti1.0.apk

Download to mobile :

img

HTC unveils new "machine" entertainment

Has name and star of entertainment manufacturer presents it as a strong candidate to become one. To do so, invest in a generous 4.7-inch screen and an audio system created by professional musicians.
HTC Sensation XL is the second model that the manufacturer taking advantage of the technology boom Beats Audio, which has acquired with the purchase of Electronics Beats in August (for which it paid 300 million U.S. dollars) .
The company, founded by producer Jimmy Iovine and the rapper Dr. Dre has specialized in the development of a headset for "sound of high performance," he explained at the time. It is that sound high-performance claims that HTC now have integrated into theirsmartphones Sensation XE and XL

htc-sensation-xe_01

The first was presented in September and is now the turn of the Sensation XL debut, which has announced European arrival in stores in early November. In EMEA, the equipment will be sold in a limited package that also includes a special edition of Solo Beats headphones. Prices are not yet known.

 

htc-sensation-xe_02htc-sensation-xe-4

The goal is that Android is seen not just as a smartphone,but as a platform for listening to music, watch movies and play details the company in a press release.
Provided with "urBeats lightweight headphones, designed exclusively for a new integrated technology Beats the equipment," also has a built-in microphone for calls in "hands-free" and a remote control - which allows you to pause, fast forward or go back to listen as well as answer a call in the middle of a song, describes the same source.
The 9.9 mm thick phone also offers support for an 8-megapixel camera and capture HD video (720p) with stereo sound, for example. The 1.5 GHz processor is another strong arguments in this "machine" that weighs 162.5 grams (with battery).

htc_sensation_xe_hands-on_ac_16-540x378

Speaking of battery, with autonomy to count up to about 7 hours (410 minutes) WCDMA talk time and 12 hours (710 minutes) in GSM. In standby, the device can handle up to 19 (WCDMA) or 15 days (GSM).

HTC-Sensation-XE-2

iPhone 4S vs Droid Bionic, Samsung Galaxy S II, and the HTC Titan

Here is a comparison between the iPhone 4S and it’s Android / Windows Phone competitors.

Comparison

RIP - Steve Jobs

proxima-invencao-do-steve-jobs1317871906

t_title

f you would like to share your thoughts, memories, and condolences, please email rememberingsteve@apple.com

Soraia Chaves will change sex!

20400_SorChaPORTS2610073_123_17loWith the opening of service to sex change in the area of ​​Coimbra actress decided
sign up for the second statement it always been curious about the world of
men and how difficult or easy it would be one.

Soraia says also that he knows will be penalized at professional and social, as it
says "sex change is not viewed favorably in Portugal."

The surgery will be performed next month by a team of 15 physicians with expertise
diverse as gynecologists, urologists, plastic surgeons, etc ...

The process of adaptation will be accompanied by psychologists and therapy sessions to
learn to behave and to know their "new" body.

The actress is afraid to stop to ask her work in the television business, but feels
which is the right thing to do with whatever the consequences.

Tomorrowland 2011 | official after movie

Tomorrowland2010Day1Like us on facebook: http://www.facebook.com/tomorrowland.be
During the weekend of 22, 23 and 24 July 2011 (BELGIUM, ANTWERP, BOOM), more than 180,000 visitors attended one of the most beautiful and talked about festivals in Europe. The 7th edition of Tomorrowland was one that would never be forgotten. An amazing festival, a magic location, wonderful decor, more than 250 artists and in particular the best public in the world! You can relive all of this now with the Tomorrowland after movie 2011. This after movie is the perfect ingredient for getting warmed up for Tomorrowland 2012 which takes place on 27, 28 and 29 july 2012.
for more info:
http://www.tomorrowland.be
DVD out soon!
Tracklist:
01. Pryda - Mirage w/ Empire of The Sun - We Are People
02. Avicii - Levels
03. Sebastian Ingrosso & Alesso - Calling W/ Dimitri Vegas & Like Mike - Generation X
04. Steve Angello & Alex metric - Open Your Eyes
05. Quintino & Apster - Epic w/ Chuckie - let The Bass Kick w/Boys will be Boys - Rock This
06. Dimitri Vegas, Like Mike, Yves V & Angger Dimas - Madagascar
07. Dimitri Vegas & Like Mike - Rej
08. Swedish House Mafia - Save The World ( Original ) w/ Tommy Trash - The End w/ Swedish House Mafia - Save The World ( Zedd Mix )
Sebastian Ingrosso & Alesso "Calling" out on Refune 31st of August
Credits:
Video production by Kemmer Media Group
http://www.kemmer.nl
http://www.twitter.com/KemmerMedia
http://www.youtube.com/KemmerMediaGroup
http://www.facebook.com/KemmerMediaGroup

Ground Zero – WTC ( 11-09-2001 )

 

wtcflagSeptember 11, 2001. A day that will forever be remembered.
Let it not be remembered for the evil acts of violence targeted at fear, panic and death. But remember the human spirit, the brotherhood of mankind, and the goodness that not only New Yorkers but Americans and the world over have dedicated to saving our most precious resource: life. For this is the only way to stand up to those wish to fight from shadows, or are rabid enough to believe it is worth their own life to see so many others end.
May God bless our Ground Heros.

american_faded_flag

ground_zero_firemen3APW2001091209845

mosque-near-ground-zero1

Startup Windows 8 in 8 seconds

tugatech_11-36-16-09

Microsoft recently published as a blog dedicated to the development of Windows 8, a new video to show the startup speed of it.

Since the power button is pressed, the system boots up in just 8 seconds. In fact, most of the time is consumed during the start of the BIOS, the system is being born in just under 5 seconds

Microsoft intends to use, this new version, several techniques which use, in its full potential, the multiple cores of the CPU's current techniques and hibernate the system.

The company also notes that these improvements will be felt by both users with conventional hard drives, as the users of SSD.

You can view the video released by the company below:

Fedde Le Grand - So Much Love (Official Music Video)

 
fedde-le-grand

OUT ON BEATPORT: http://www.beatport.com/release/so-much-love/438196
VOTE FOR FEDDE! http://www.djmag.com/top100
Fedde's new release on Toolroom Records, available on Beatport August 26, 2011
Filmed during Fedde's 2011 Summer Takeover Tour:
- Exit Festival, Novi Sad (Serbia)
- Revellin, Dubrovnik (Croatia)
- Street Parade, Zurich (Switzerland)
- Loveland Festival, Amsterdam (The Netherlands)
- Riva Discotheque, Split (Croatia)
Video Created by Final Kid
- Fedde about his new release:
"Preparing my Summer Takeover tour sets, I always like to do some rework of existing tracks. One of the tracks that came by was "So Much Love To Give" by Together (aka Thomas Bangalter & DJ Falcon), which uses a sample from "Love Is Such A Wonderful Thing" by the 70's disco act The Real Thing. That original track was embedded on one of the first funk albums I bought, and I've listened to it since I was about 13.The Together version was such an inspiration, but I've always wanted to do my own thing with the original and now I did. The first live reactions were great, and I'm happy to see a lot of people now look for my version of this all time classic!"

MSI has dust removal system

 

msi-n560gtx-ti-hawk_2

MSI has presented a simple but functional idea to remove dust accumulated in the sinks in the graphics card.

The concept is very simple but apparently very functional. During the first 30 seconds of operation, the fans rotate in the opposite direction to normal vacuuming accumulated in the sinks. After this time, the rotation back to normal, blowing air sinks to increase the efficiency of distribution.

Translate Website

ShareThis