|
views:31046
01:20:11
05/06/2009
Google Wave - Replacing Email
Google Wave starts out with a conversation as a lightweight tree structure of messages with a set of users participating in the conversation. Instead
of individual messages sent back and forth, it consists of an entire conversation object as a shared object hosted somewhere. Users who participate can open up that wave (shared object) work with it, add something and exit. Every wave is stored in a centralized location and is accessible to all the users who have the permissions to use it and multiple users can update a wave at the same time concurrently and every user involved can observe the changes being made in real time. Google wave offers the use of richly formatted text, photos, gadgets and even feeds from other sources on the web.
(read less)
Keywords:Twave, Linky, Searchy, Buggy, Federations, wavelinks, wavelets, Fresh wave, Google playback, Google I/O, Google wave technology, Google API, HTML5
|
views:10383
00:05:43
03/06/2009
Milo from Project Natal
Microsoft unveiled Project Natal, its answer to Nintendo Wii, at E3 2009. Project Natal is a motion sensing device that allows you to control video ga
mes with your body instead of a peripheral controller. The video takes us through the demo made by Peter Molyneux at E3 2009 on Project Natal and the character called Milo. Milo was displayed to demonstrate the motion sensing capabilities of Project Natal. Milo resembles a real character and is capable of recognizing faces, emotions and voices. One can interact with him just like one does with a human being. Milo responds to you and he also reacts with the appropriate facial expressions depending on facial gestures and voice tone. A behind-closed-doors meeting was also held at E3 in order to give the media a sneak peek into Milo and also in order to make them interact with Milo.
(read less)
Keywords:motion controls, video gaming, electronic entertainment, Nintendo Wii, Microsoft Xbox 360, Project Natal, E3 2009, Milo
|
views:10426
00:03:40
01/06/2009
Project Natal (Microsoft's Controller Free Gaming)
Microsoft introduces a revolutionary new way to play without a game controller - Project Natal. It was announced during the 2009 E3 show on 1 June 200
9. Natal has 3D motion sensing with full facial and voice recognition. Compatible with any Xbox 360 system, the sensor is the world’s first to combine an RGB camera, depth sensor, multi-array microphone and custom processor running proprietary software all in one device. One of the most stunning moments of the Xbox 360 press conference this morning, was the introduction of Peter Molyneux's animated character called Milo. Milo can recognize your face, emotions and will interact with you on a very deep level. Watch http://www.2100science.com/Videos/Milo_from_Project_Natal.aspx to see how Milo interacts with a girl. The box itself sits beneath your TV and can get an accurate sense of your space and you in it. The add-on will offer features such as auto sign-in for players to Xbox Live based on facial recognition and it sports extremely detailed body tracking which will be able to follow the individual movements of separate limbs. Additionally, you can move through menus by swiping your hands back and forth, use your own gear like a skate board, juggle multiple users during a single session, interact and play with online friends. Natal’s Motto: “The only experience you need is life experience” Launch Video: http://e3.gamespot.com/press-conference/microsoft-e3/ Live demonstration: http://www.youtube.com/watch?v=36AwO0cVxaA
(read less)
Keywords:X-box 360, Nintendo, Wii, E3 2009, Xbox Live, Microsoft, Project Natal, game controller, facial recognition, voice recognition, Peter Molyneux's Milo
|
views:7039
00:09:31
30/05/2009
Space Based Internet
Imagine checking your emails while you are in the middle of a desert or while you are on an adventure vacation in a forest!! If it sounds good, you ma
y very well feel better knowing that technology in wireless connectivity will make it a reality. Evolution in communication technologies will enable use of satellites to carry internet traffic and provide seamless wireless and satellite connectivity even in remote locations. The use of satellites can assist us to overcome the limited reach that ground networks provide. Cisco Systems, a global leader in networking products and solutions has come up with products for mobile connectivity. Mobile Access Technology, a core component of Cisco’s mobile router family has been tested by the US Coast Guard and was successfully integrated in the UK Disaster Monitoring Constellation satellite. John Chambers, President and CEO of Cisco Systems, tells us that there are immense opportunities for IP capabilities to be used as an integral part of satellite communications.
(read less)
Keywords:seamless connectivity, wireless connectivity, satellite connectivity communication, broadband, internet protocol, Cisco Systems, Mobile Access Technology, mobile router, US Coast Guard, UK Disaster Monitoring Constellation, John Chambers
|
views:7614
00:05:10
14/05/2009
Online Surveillance & Data Mining
A fully automatic program combs the internet in search of militants and their followers. The software tries to identify anonymous authors using text c
riteria such as word length, punctuation, syntax and content to create a profile almost as unique as a human fingerprint. The software then provides a graphic representation of the results known as a ‘right print’. The software can also recognize the opinion leaders among the center of the network. Hsinchun Chen, the head of the “Dark Web Project” explains that they have expanded the software to about 25,000 to 30,000 features that can be identified. Attempts to misguide the computer by changing the style of action by a terrorist can also be counterfeited by the software as is explained in this wonderful video. The video also contains various other instances of computer surveillance and data mining based methods being used to detect and catch militants and miscreants.
(read less)
Keywords:Data Mining, Online Surveillance, Terrorists, Militants, Dark Web Project, Text Mining, Natural Language Processing, Graph Drawing, Signature, Fingerprint, Feature Extraction, Clustering, Classification
|
views:14553
00:02:31
13/05/2009
Quantum Encryption - Unbreakable
As computers get faster and more powerful and as computer hackers get smarter and more sophisticated, it is becoming a daunting task to track eve drop
pers and miscreants. Scientists at the National Institute of Standards and Technology (NIST) have got closer to a practical solution to defeat the bad guys. They developed a high speed system using individual particles of light, or photons to first scramble and then decode large amounts of data including videos transmitted in real time. Xiao Tang, a physicist at NIST explains that the speed of their quantum key distribution system is extremely fast thereby allowing for encryption and decryption in real time. Current encryption systems use secret codes based on random numbers with hundreds of digits to encrypt the data. But like the vault at the bank, they can be broken with enough time and computer resources by finding the right combination. Quantum encryption uses even longer strings of constantly changing secret digits. But the most important feature is that the secret key and the combination are written in a kind of a disappearing ink that only the sender and receiver can read. Alan Mink an electronics engineer at NIST says that as soon as information is extracted from a photon, the information gets destroyed. If once a message is received, it guarantees that it has not been eaves dropped by anyone. While a few more companies have developed quantum encryption systems, the system developed by NIST is unusually fast. NIST’s system can individually encrypt every pixel of a web quality video in real time and in addition each key used by the system is used only once. Their framework uses optical fibers to transmit the data and is being sought out as the best system existent till now thereby making it a quantum leap in the world of computer security.
(read less)
Keywords:Quantum Encryption, Quantum Key Distribution, Cryptography, BB84 protocol, Superposition, Indeterminacy, Algorithm, Qubits, Photons, Heisenberg Uncertainty Principle, Photon Polarization
|
views:29547
00:08:00
28/04/2009
History of Ipod (Part 1 of 5)
On 23rd October 2001 Apple launched a brand of portable media players under the name of iPod. Little did the world know (including Apple itself) that
the product would transform into a cult phenomenon in a short span of time. The history that is associated with the making and design of the iPod is as fascinating as the product itself. Apple co-founder Steve Jobs was ousted out of Apple in 1985 by John Sculley, then CEO of Apple. Under Sculley’s reign Apple was without a vision and a direction and it lacked the competitiveness required to turn the sagging fortunes of the company. Steve Jobs returned to Apple as its CEO in 1995 when it was in dire straits. He brought with him the vision that would later propel Apple from being a computer company to a music powerhouse. Apple launched iMac in 1998 and went on to release iPod in 2001.This 5 part video series takes you through the behind-the-scenes story of the revolution that is iPod. Part2: http://www.youtube.com/watch?v=PeeyQFh6MHQ Part3: http://www.youtube.com/watch?v=NNS51uz5elI Part4: http://www.youtube.com/watch?v=D-afx2vf-wU Part5: http://www.youtube.com/watch?v=aEJfwIlNdMQ
(read less)
Keywords:Apple Inc., iPod, Steve Jobs, John Sculley, iMac, iPod shuffle, iPhone 3G
|
views:7199
00:02:27
22/04/2009
Cell Phones of the Future
From the plain vanilla tasks of taking pictures, playing music et al cell phones have come a long way. In today's world you can use them as a fashion
accessory with the arrival of diamond crusted phones like the Nokia Vertu or with another tech wonder from Nokia's stable called "Point and Find", you can actually point your camera at any object and access all relevant information about it online on the move. This is just the beginning as Mr.Anthony Townsend from “The Institute for the Future” says you will be able to transmit desires and emotions in real time through these devices to other people.
(read less)
Keywords:Nokia, Point and Find, transmit desires, transmit emotions, Institute for the Future, Nokia Vertu, diamond crusted phones
|
views:11737
00:04:34
16/04/2009
Grid Computing
Suppose we create an environment where we can cluster all the computers in the world and create wide area parallel and distributed computing with nece
ssary networking protocols. Such an infrastructure is called ‘Computer Power Grid’ (CPG) or grid computing.
(read less)
Keywords:CERN, future of internet, Data Grid, internet protocol, numerically intensive computing, computing power, super computer
|
views:6167
00:08:53
27/11/2008
How are Microchips Produced?
We are surrounded everywhere by arguably the most revolutionary invention in the last 50 years. Electronic chips are miniaturized miracles which act a
s mini gizmos. How are silicon wafers and modern microchips produced? This video clearly explains the intricate processes involved in making these tiny chips. The silicon wafers are made with a surface roughness of less than one millionth of a millimeter. The complicated digital circuits are then etched over these high quality wafers. Chips with capabilities of nearly a billion transistors are put in at a microscopic level as part of today’s advanced circuits. This is done through a process called photo lithography. View various details of the jigsaw that make up the process of the chip design. View this wonderful journey involving silicon, which starts out as nothing but a grain of sand and turns out to be the brain behind today's devices.
(read less)
Keywords:Microchips, Micro Chips, Silicon Chips, Silicon Wafers, Transistors, Photo Lithography, Integrated circuit, IC, Microcircuit, semi conductor, SSI, MSI, LSI, VLSI
|
|