Saturday, March 28, 2015

Mobile


http://money.usnews.com/money/personal-finance/articles/2015/01/13/10-ways-to-keep-your-phone-safe
 How  Do I Protect the Information on My Mobile Phone?

A mobile phone is a wireless handheld device that allows users to make calls and send text messages, among other features. The earliest generation of mobile phones could only make and receive calls. Today’s mobile phones, however, are packed with many additional features, such as Web browsers, games, cameras, video players and even navigational systems.

A mobile phone may also be known as a cellular phone or simply cellphone.

When the first mobile phones were introduced, their only function was to make calls, and they were so bulky it was impossible to carry them in a pocket.

Later, mobile phones belonging to the Global System for Mobile Communications (GSM) network were capable of sending and receiving text messages. As these devices evolved, they became smaller and more features were added, such as multimedia messaging service (MMS), which allowed users to send and receive images.

Most of these MMS-capable devices were naturally equipped with cameras, which allowed users to capture photos with the built-in camera, add captions, and send them to friends and relatives who also had MMS-capable phones.

A mobile phone with highly advanced features is called a smartphone, while a regular mobile phone is known as a feature phone.

A mobile phone typically operates on a cellular network, which is composed of cell sites scattered throughout cities, countrysides, and even mountainous regions. If a user happens to be located in an area where there is no signal from any cell site belonging to the cellular network provider he or she is subscribed to, calls cannot be placed or received in that location.

Simple steps that can protect your phone and information

Smartphones need to be updated when security fixes are developed. Though basic phones generally don’t get updated, smartphones are essentially computers and they may need updates. While some updates simply provide you with cooler functionality and upgraded features, others fix critical security vulnerabilities that you do not want to be exposed to. Your service provider should notify you whenever an update is available; ignore these at your own peril.

Think before you click, download, forward, or open. Before responding, registering, downloading or providing information, get the facts. Go online to check for scams, look up the company or sender, search for hidden fees or reports of malware associated with the company or sender, and independently verify any claims. No matter how tempting the application, if the download isn’t from an app store or the site of a trusted company, walk away.

Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your personal information. Walk away if the app wants more access than is needed to run their service.

Backup your phone’s information. How many friend’s (or family member’s) phone numbers do you actually know? For many users, the only source of contact information for people is stored on their cell phones. This makes the loss of a phone painful and potentially hazardous. By backing up your data you ensure you have it – even when you don’t have your phone.

Thursday, March 26, 2015

Kinetic

Kinetic (adjective) of relating to , or resulting from motion

The kinetic is a microlight that responds to movement , enabling you to create a dazzling array of customized light shows using nothing but your hand and fingers , colours, timings and more .This device is an usual lamp that mixes technology , art , and electronics . There are many different colours  available. According to the team behind the invention , says that it's suitable for beginners as well as more advanced musicians and artists. If you're not personally interested in creating light show with your gloves , the technology behind the kinetic is fasinating and worth checking out .
http://www.msn.com/en-gb/news/personal/best-new-inventions-for-2015/ss-BBhjLhj#image=3