Saturday, 27 July 2013

Your face is the new credit card :



No more swiping cards! A new technology that allows customers to use their facial features instead of swiping a credit card to purchase goods has been developed by a Finnish company.
The technology provided by Uniqul, works by recognizing the customer's face and then linking it to the individual's bank account . So instead of swiping a credit card to purchase goods, the customer gazes into a camera.
Uniqul claims its service is secured with military-grade algorithms , 'The Australian' reported . Uniqul's Ruslan Pisarenko said the technology — which is due to roll out next month — has the ability for transactions to be completed instantly and can even distinguish between identical twins, 'News Limited Network' reported. According to Pisarenko, "the face is a PIN and it's more like a complete way to identify a person.

But in some cases where the system is not 100% accurate, it will ask a person to input their PIN as security," he said. There is no payment card involved, nor is a mobile or wallet needed. Customers sign up to the technology by registering their identification and bank details. Once the items are scanned through the customers' details will flash up on a screen and they click "OK" to confirm the transaction.
The new tech is similar to facial recognition identification which is used by international travellers at airports in Australia. The company is getting ready for deployment of the system in Helsinki, news website goodnewsfinland.com reported.
The company said its patent pending technology allows to reduce time spent on transactions close to zero seconds.http://pi.feedsportal.com/r/172189726587/u/53/f/533923/c/33039/s/2f14cec8/a2t.img


3D Printing Grows at 2014 International CES



Business Wire India  
 The Consumer Electronics Association (CEA)® today announced its new 3D Printing TechZone for the 2014 International CES®, showcasing the latest advancements in 3D printing technology from top companies in the category. The 2014 CES, owned and produced by CEA, is the world’s leading innovation event and is scheduled to run January 7-10, 2014, in Las Vegas, Nevada.
Following its initial launch, the 3D Printing TechZone sold out more than 3,000 net square feet of exhibit space and has since expanded by more than 25 percent to meet exhibitor demand. The new TechZone currently features nine exhibitors, including 3D Systems, Makerbot Industries, Sculpteo, and Stratasys Inc.
“Exhibitor demand really drove our decision to formalize this 3D Printing TechZone, as it’s quickly becoming one of the more dynamic and innovative categories within our industry, while also becoming more accessible to consumers from a price perspective,” said Karen Chupka, senior vice president, International CES and corporate business strategy. “The sell-out response to this TechZone speaks to the strong interest in this category and the desire from leaders in the field to showcase their new products on the CES show floor.”
The 3D Printing TechZone will be located in the Las Vegas Convention and World Trade Center (LVCC), South Hall 3, and will feature 4,400 net square feet of space. The new TechZone will showcase additive manufacturing processes transforming 3D printing, from prototype use in the medical, aerospace, engineering and automotive industries, to more compact units that are making 3D printing more accessible for today’s consumers.
The 2014 CES will feature 20 market-specific TechZones highlighting innovation across 15 different product categories. Companies interested in exhibiting in the new 3D Printing TechZone should contact Aurelie Cornett at ACornett@CE.org or 703-907-5245.
Registration for the 2014 CES is now open. For more information on the 2014 CES, visit CESweb.org.
Note to Editors: The official name of the global technology event is “International CES.”Subsequent references to the show can be shortened to “CES.” Please do not use “Consumer Electronics Show” to refer to the International CES.
About CEA:
The Consumer Electronics Association (CEA) is the preeminent trade association promoting growth in the $209 billion U.S. consumer electronics industry. More than 2,000 companies enjoy the benefits of CEA membership, including legislative advocacy, market research, technical training and education, industry promotion, standards development and the fostering of business and strategic relationships. CEA also owns and produces the International CES – The Global Stage for Innovation. All profits from CES are reinvested into CEA’s industry services. Follow CES online at www.CESweb.org and through social media: http://www.cesweb.org/social
UPCOMING EVENTS
CEA PlugFest19September 8-13, 2013, Milpitas, CA
DMW VideoSeptember 18, 2013, New York, NY
CES Unveiled LONDONOctober 1, 2013, London, UK
CES Unveiled PARISOctober 3, 2013, Paris, France
CES Unveiled TEL AVIVOctober 7, 2013, Tel Aviv, Israel
2013 CEA Industry ForumOctober 20-23, 2013, Los Angeles, CA
17th Annual CEO SummitOctober 23-25, 2013, Rancho Palo Verdes, CA
CES Unveiled NEW YORKNovember 12, 2013, New York, NY
CES Unveiled LAS VEGASJanuary 5, 2014, Las Vegas, NV
2014 International CESJanuary 7-10, 2014, Las Vegas, NV


Tuesday, 23 April 2013

Error message "VB.NET"


you try to use Data Source Configuration Wizard to create a connection to Access or a SQL data source. When the wizard reaches the Choose Database objects page, you may receive one of the following error messages.

"Could not load type  'Microsoft.VisualStudio.DataDesign.SyncDesigner.SyncFacade.SyncManager'  from assembly Microsoft.VisualStudio.DataDesign.SyncDesigner.DslPackage,  Version = 9.0.0.0, Culture=neutral, PublicKey Token=b03f5f7f11d50a3a"

sol:
The error message is caused due to an incomplete installation of Service Pack 1 for Visual Studio 2008 which could result in a mismatch between the file versions of Microsoft.VSDesigner.dll and Microsoft.VisualStudio.DataDesign.SyncDesigner.DslPackage.dll. The former is updated to Service Pack 1 version and the latter will have the RTM version. This problem is more likely to happen in environments wherein you install different edition of Visual Studio side by side and you upgrade one edition and not the other. For example, you have an installation of Visual Studio Express release version and Visual Studio Team Suite release edition installed side by side and then you only upgrade the express edition to Service Pack 1 but leave the Team edition at RTM level, you will get the first error discussed in the symptoms section

*To resolve the first error message, install Service Pack 1 for all the Visual Studio 2008 editions on the affected system


Saturday, 20 April 2013

World‘s first smartphone for the blind, made in India


The world's first smartphone for blind people is here. Soon, they will be able to read SMSes and emails on this phone, which converts all text into Braille patterns. 

"We have created the world's first Braille smartphone," says its innovator, Sumit Dagar, whose company is being incubated at the Centre for Innovation Incubation and Entrepreneurship, located in IIM Ahmedabad campus. "This product is based on an innovative 'touch screen' which is capable of elevating and depressing the contents it receives to transform them into 'touchable' patterns," he says. 

Dagar, who is a post-graduate from the National Institute of Design (NID), says he was motivated to develop the device when he realised that so far, technology was only serving the mainstream and ignoring the marginalised. He is collaborating with IIT Delhi on making the prototype, which is currently being tested at L V Prasad Eye Institute in Hyderabad. 

"The response during the test has been immense. It comes out as a companion more than a phone to the user. We plan to do more advanced versions of the phone in the future," Dagar adds. 

Dagar started the project three years ago while studying interaction designing at NID. After working with a couple of companies, he gave up his job to concentrate on his technology, formed a team of six people and started his venture, Kriyate Design Solutions. Currently, the venture is being funded by Rolex Awards under its Young Laureates Programme, in which they select five people from across the world every two years and fund their projects. 

How it works 

· The smartphone uses Shape Memory Alloy technology, based on the concept that metals remember their original shapes, i.e. expand and contract to its original shape after use. 

· The phone's 'screen' has a grid of pins, which move up and down as per requirement. The grid has a Braille display, where pins come up to represent a character or letter. 

· This screen will be capable of elevating and depressing the contents to form patterns in Braille. 

· All other elements are like any other smartphone.

Posted By: rihan khan




Plastic iPhone shell appears in leaked photo




This morning a single photo of what very much appears to be the fabled low-cost plastic iPhone. This device has been said to be appearing later this year in a collection of colors for a price that will allow Apple to not only sustain iPhone sales on the whole, but to expand to markets previously unavailable to them due to the cost of producing the standard iPhone. This case may well also be just that – a case.
What you’re seeing here is the back of what’s very much intended to look like an Apple product, at least. If you have a peek at the camera lens hold and flash bulb hole, you’ll see that there’s also a microphone hole in-between. You’ll see a printed-on ink Apple logo as well as the standard “iPhone” lettered-logo in their regular places, while the left-hand side of the device appears to have slightly updated places for buttons.
This setup shows the new iPhone – if that’s what this is – to be working with volume knobs and a lock switch not unlike that of the iPod touch units of the past. This case also appears to be a bit thicker than the iPhone is currently, leading us to believe that this will either be a high-capacity model using a massive battery or that it is, again, just a case for a future iteration of the standard model.
Another possibility is that this photo has been forged entirely – keep your wits about you and make sure you’re questioning everything that appears with an Apple logo on it in this time before the launch of Apple’s newest product. Head down to the Apple hub we’ve got set up for more information on the possibilities this summer and stay tuned as more colors arrive!
[via Tactus]

Plastic iPhone shell appears in leaked photo is written by Chris Burns & originally posted on SlashGear. 

Posted By: charitra swaroop




Monday, 25 March 2013

IDENTITY_INSERT

Cannot insert explicit value for identity column in table ‘tblTestTable’ when IDENTITY_INSERT is set to OFF.

Suppose you have a table in MS Sql with two Columns.
CREATE TABLE [dbo].[tblTest](
[Test_Id] [int] IDENTITY(1,1) NOT NULL,
[Test_Name] [varchar](200) COLLATE SQL_Latin1_General_CP1_CI_AS NOT NULL,
CONSTRAINT [PK_tblTest] PRIMARY KEY CLUSTERED
(
[Test_Id] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON, FILLFACTOR = 90) ON [PRIMARY]
) ON [PRIMARY]
Now you are inserting the three values in this table:
Insert Into tblTest(Test_Name) values(“Test1″)
Insert Into tblTest(Test_Name) values(“Test2″)
Insert Into tblTest(Test_Name) values(“Test3″)
So your table will look like as follows:
1 Test1
2 Test2
3 Test3
Now you are deleting second row of the table using the following syntax:
DELETE From tblTest where Test_Id=2
Now you table will looks like the following:
1 Test1
3 Test3
Now you are going to insert a row with the following query:
Insert Into tblTest(Test_Id,Test_Name) values(2, “TestTemp2″)
when you execute this query, you will face the following error:
This error is coming when we have a Identity Specification is ‘Yes’ and IsIdentity is also ‘Yes’, Identity Increament is set to(1/2/…).
So you are unable to insert this type of row, because sql know that the Test_Id is the Identity_Column and so you cannot insert the value which already inserted. So to resolve this error, you have to set the Column_Identity ON by using the following syntax.
SET IDENTITY_INSERT tblOrderItemStatus ON
Then try to insert the row using the above same query, which was as following:
Insert Into tblTest(Test_Id,Test_Name) values(2, “TestTemp2″)
Now you need to reset the Column_Identity OFF. You can do it just by the following syntax:
SET IDENTITY_INSERT tblOrderItemStatus OFF
Is it resolve your problem. Howdy buddy?….

Wednesday, 30 January 2013

Why the Internet works and how to break it





If the internet was a person, it would be beginning to feel its age this year as it gets into its 30s, with a mid-life crisis looming. As it happens, the internet has never looked better: it's faster, bigger, better and richer than it was in its 20s.
But there are people having a midlife crisis on the internet's behalf. Governments want to change how it is governed, how it works and, most disturbingly, its openness. So, it is worth taking a moment to outline the first principles of the internet that have made it successful, why they are worth preserving and what we can expect if they are preserved.

Bob Kahn and I began work on the design that became the internet in the 1970s, motivated by the spectacular success of the Arpanet project, funded by the US Defense Department , in which small computers sent data 'packets' across dedicated telephone circuits. It was a homogeneous network connecting inhomogeneous computers: different operating systems, different word sizes, different computational capacities.

We met in 1973 at Stanford and started working on a design to allow up to 256 networks to be connected in such a way that the host computers would not need to know anything about the layout of this super-network . At the same time, every host computer would be able to talk to every other one despite their different operating systems and other differences. We also worked on a detailed design of the Transmission Control Protocol (TCP) and began implementing and testing it in 1975.

We were sure that this was powerful . The packets we were using to transport data were remarkably adaptable : they could be transmitted over any digital communication channel , bringing with them any information that could be digitised. The network was not designed for a particular application and this has allowed it to support applications that weren't predicted in the early formulation of the internet's design.

We didn't , for instance, anticipate the hand-held mobile. We did anticipate an 'Internet of Things' — more on that in a moment — and personal computing. We even foresaw notebook computing, whereby a computer that isn't powerful can perform tricky tasks by drawing on the internet. We didn't have to imagine it. Alan Kay had shown a notebook-computer concept around 1968 he called FLEX and Xerox Parc built the Alto personal computer along with the Ethernet in the early 1970s. They were living in a world that others would not experience for 20 years.

The system Bob
 and I designed, alongside collaborators from Europe and Asia who visited our lab in the mid-1970 s, has since grown by factors of a million or more on all dimensions : a many million times more users , a million times more hosts, a million times more networks, all connected a million times faster.

But the numbers aren't the only difference . The internet era is different from the telephone era for at least two reasons: it allows groups to communicate , coordinate, collaborate and share information, and it supports every medium of communication invented, all in one network. People can discover each other without knowing who they are and they can find groups with common interests.

The institutions spawned by the internet and which regulate and build the internet are similarly meritocratic and diverse. The Internet Society , Internet Architecture Board, Internet Engineering and Research Working Groups, Internet Governance Forum and Internet Corporation for Assigned Names and Numbers : all of them are run by many 
stakeholders who together decide policies and standardisation. It is a meritocracy that respects ideas more than institutions. It values openness and sharing of information, freedom of choice and expression.

Of course, the internet can be abused and people harmed from that abuse . Protection of personal information should be a high priority for all internet application providers. We also need to educate people about what can happen when they share information on the internet: once it is available to anyone, it is possible for someone to upload to other sites or to capture and store the information . Any country that gets the internet soon finds out that some harm comes from people who are in other national jurisdictions. We will need to find ways for international cooperation to deal with abuse.

But as we do figure out better ways to make cyberspace safe to use, we must preserve the very properties that have made it so successful: freedom of expression, transparency and openness, participatory policy and technology development.

Sample Text

Sample text