Android 4.0 Ice Cream Sandwich

0 comments
Android 4.0 Ice Cream Sandwich and the Nexus Prime are appearing everywhere. It seems the Ice Cream has finally started to melt and everyone wants a scoop....
Read more »

Spy in the Watch

0 comments
This watch looks like an ordinary watch, but inside there is a hidden camera which is ideal for your covert spy operations. This spy camera can capture up to 16 hours of video footage and take pictures directly from your wrist watch wherever you go.It is built-in with 2GB of internal memory for up to 8 hours of recording, or a 4GB of internal memory for a whopping a 16 hours of video recording. To view your footage simply plug a USB cable into the watch's covert USB port and review everything on a computer quickly...
Read more »

Digital Binoculars

0 comments
The binocular/digital camera combo is a great idea, packed with some cool features like a flip-up 1.5″ LCD display for viewing the camera images, 8X digital zoom and 5-MegaPixel digital camera.The onboard memory is only 32MB but this can easily be expanded up to 2GB and the USB port makes it easy to get photos moved onto your comput...
Read more »

Virtual Keyboard

1 comments
The Virtual Laser Keyboard (VKB) is a revolutionary accessory for all the portable gadgets like Blackberry, Smartphone, PDA, MAC & Tablet PC but can be connected to a computer too using a USB dongle. The Virtual Keyboard comes with an elegant leather jacket and you can take it with you in your pocket. It is of the size of a Zipo lighter and operates in total darkness. It uses a laser beam to generate a full-size perfectly operating laser keyboa...
Read more »

USB Charagable AA Batteries

0 comments
These standard AA batteries can be re-charged through any USB port. Each battery comes with a colorful green cap that pulls back to reveal a port, and then snapped back into place for u...
Read more »

Wireless Charging

0 comments
The Source will carry the latest electronics for the upcoming holiday season such as: a children's 12mp camera, a Bluetooth headset, DJ Hero and a wireless charging travel m...
Read more »

Future of Internet Search

0 comments
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...
Read more »

Hybrid Dual Portable Computer

0 comments
Mobile Intelligent Ubiquitous aka MIU has unveiled the third generation of its Hybrid Dual Portable Computer (HDPC). The new model offers a 4.1 inch TFT display (800 x480 resolution), a 2.4 inch AMOLED internal display (320 x 240 resolution), ARM processor for menial tasks, Intel Atom processor, Windows CE operating system and DMB navigation capabili...
Read more »

Wi-Fi Umbrella

1 comments
The high-tech brolly allows you to take pictures with a built-in camera. These can be uploaded to Flickr via a wireless internet connection and within two minutes you can watch downloaded photo-streams on your umbrella screen with a simple wrist-snapping movement.Invented in Tokyo the Pileus umbrella also has GPS and a digital compass, which uses Google Earth to help you navigate yourself around the world. They are working on incorparating a video camera as we...
Read more »

Six Point Charging Device

0 comments
Introducing a six point charging device, which allows the user to charge up to six devices simultaneously.Chargepod, which comes with many versions of power adapters, these are controlled by a system called voltage regulator technology, which will make sure that each device that is connected to it will only get the right amount of power, this is essential for the long life of the device. Where the wire is connected to the Chargepod there is a cool blue indicator light, which shows what device is on char...
Read more »

Steganography

0 comments
Steganography is the art of hiding the message in an image, audio or video file.The implementation of this technique involves designing complex algorithms and substitutions.The simple way to implement steganography without designing an algorithm is by using command prompt in Microsoft Windows Operating Systems.Follow the steps:1: At First Select the image file in which you are going to hide the data.2: The data which your going to hide must be placed in a RAR file.3: Open the command prompt and move to the location...
Read more »
 

Copyright © 2010 • TechnoByte • Design by Dzignine