Place to enhance your knowledge and learn any of future gadgets and new technology nowadays.


The iPhone 3.1 software update, which was issued yesterday, has caused some handsets to freeze and get stuck in a restore "loop". It means the device is wiped of all content, and cannot be used to make or receive calls. Downgrading to the previous 3.0 operating system is also proving difficult for users. "I've been trying everything I've found on trouble shooting pages and on some searches," writes a user, Batwing, on Apple's support forums. "I'm getting numerical errors after the phone/computer tries to restore to 3.1. (6, 14, etc.) I've reinstalled iTunes, tried restoring on 3 different computers, held down power/home buttons, moving to different USB slots..."

"I've been able to restore back to 3.0, but trying to update to 3.1 gets the iPhone stuck in recovery mode every time," writes ThisIsTheChris. "I tried to upgrade to 3.1 also and now am the proud owner of an expensive doorstop," writes John Gordon Doty. "Does Apple ever test these upgrades? They must, but it sure makes you wonder when so many people have the same problem with the same software."

Disgruntled iPhone owners have also been using Twitter to discuss the issue and find solutions. "Still waiting on restore on my iPhone. 45 minutes and counting. Beware the 3.1 update – make sure you're backed up," warned Grvychk. It is not known how many iPhone users are affected by the software problems, nor what has caused dozens of devices to crash. Apple has not commented on the situation, although it is likely that engineers are already working on resolving the problem. The new iPhone software was unveiled by Apple's chief executive Steve Jobs, who underwent a liver transplant earlier this year and last made a public appearance in October 2008. He also showcased a new iPod nano with built-in video camera, spec bumps to the iPod touch and iPod Classic range, and a new version of iTunes with features such as iTunes LP, which downloads sleevenotes and artist videos whenever a user buys an album, and Genius Mixes, which auto-generates playlists of "songs that go great together".(


:astig:Scientists managed to turn light into sound using their latest-invention - a brand new laser technology. A team of researchers at the Naval Research Laboratory developed a technology able to increase and improve underwater acoustic applications. The technology allows compressing laser pulses. It is worth mentioning that different colors of a laser pass through air and water at different speeds. However, in the water the concentration effects prove to be stronger. It is possible for a well-tuned laser to pass several hundreds of meters through the air and then rapidly compress after entering the water, which would help a jet to send messages underwater, reports LiveScience. If the colors of a laser are arranged in a particular way, the laser pulse would compress in time while passing through the water, which focuses the light. To be able to transform light into sound, researchers compress a laser pulse so it would ionize a small quantity of water. After giving charge to the molecules of water, the ionized water soaks up the laser energy and then heats up. Finally scientists witness a small explosion of steam that produces a pulse of sound having 220 decibels. (



Despite Apple’s well-publicised claims that Macs are safer than their PC-based rivals, security expert Charlie Miller, author of The Mac Hacker’s Handbook, says that "Snow Leopard's more secure than [previous release] Leopard, but it's not as secure as Vista or Windows 7." Mr Miller says that Apple missed an opportunity to make Snow Leopard more secure when it ignored the security developments Microsoft had made three years ago in building Windows Vista. He points to a system called address space layout randomization (ASLR), which "randomly assigns data to memory to make it tougher for attackers to determine the location of critical operating system functions, and thus make it harder for them to craft reliable exploits." Mr Miller says that Leopard’s ASLR was substandard, and Apple have failed to address the issues. He said: "Apple didn't change anything. It's the exact same ASLR as in Leopard, which means it's not very good." He had made the same criticisms when Leopard was originally released. He concedes, however, that Apple have plugged some security holes, notably in QuickTime.

At the moment, says Mr Miller, Mac users are far less likely to get hacked than PC users. However, that is simply due to numbers: there aren’t enough Macs to make it worthwhile for hackers. He says: "It's harder to write exploits [hacks] for Windows than the Mac, but all you see are Windows exploits. "That's because if [the hacker] can hit 90 per cent of the machines out there, that's all he's gonna do. It's not worth him nearly doubling his work just to get that last 10 per cent." However, Snow Leopard has still outshone both Leopard and the previous system Tiger in first-week sales, by a distance. It has sold twice as many copies as Leopard did in its first week, and almost four times as many as Tiger. (


:astig:Eco-friendly vehicles aren't something new today, but Taxius Animalus is a completely different story. This concept car represents an all-electric taxi that has six wheels and was designed to be able to pass through off road terrain. The design is credited to Francis Gomes from Turin, Italy.

The vehicle might be far from being produced for the masses, but its design is definitely worth highlighting. It is worth mentioning that the taxis used today emit a lot of gases everyday and a large portion of those gasses are wasted when taxis wait for passengers or are stuck in traffic jams. Taxius Animalus is not just eco-friendly, it is also capable of transporting people to areas where normal taxis would never pass using its six wheel track resembling that of a tank, informs Tuvie. You can find more information about cars at - please check the links at the bottom of the story.

The vehicle is made using tough fabricand welded hollow tubes. It features transparent exterior skin (which allows seeing the whole surrounding scenery) and composite panels. Still there is no information regarding the type of battery that the taxi uses and its location, the way the vehicle charges and the time required for a full charge.(


Free Music Download
Download free music movies games at http://www. Topfreemusicdownloadsite. Com West Michigan Window Tinting
At muskegon window tinting we specialize in protecting your home, business, or auto. We can help you reduce your energy costs, as well as fading and glare, add privacy to any home Link Market - Free Link Exchange, Link Swap and Link Trade Directory
Have you ever tried to exchange links, swap links, or trade links? Was it hard? Use link market instead; - it is easy to use, free and very smart. It will save you hours of work.

Privacy Policy

Privacy Policy -

Privacy Policy for

If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at

At, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by and how it is used.

Log Files
Like many other Web sites, makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include Google Adsense, .

These third-party ad servers or ad networks use technology to the advertisements and links that appear on send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see. has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices.'s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.


Blogumulus by Roy Tanck and Amanda Fazani

About Me

My photo
Hmm my name is Firzy Yuansyah whom like to read so much and loves technology.I want to share about any tech news around the world and what happened in my life to all of you.

ShoutMix chat widget