New game “Get Even” – how true Next-Gen game?

    

            

                    

        



Although

through the launch of a new console generation (next-gen console) to damping, but still no-where branded Next-Gen that is really a game I have not shown the potential of the console. What’s new with

suddenly I stumbled on to this game, “Get Even” is a game that uses scanning technology environment called Thorskan scene and scanned into the game. The result is a detailed and realistic that is almost indistinguishable from the real thing or scene in the game (each one is scanned from real people) and he said that the real Trailer 2-3 shock. The only remaining rendering from the game before!

Thorskan technology is invented and developed by the Polish Better Reality of it is working. Scan the details from the real into the computer. Then create a high-resolution three-dimensional model once again. Originally developed for use in the ad industry and Hollywood movies, but he claims that the gaming industry with a

back to the game as of now the game does not tell you anything more at all. I just went to a game between the singleplayer and multiplayer shooter that blends together (hybrid single / multiplayer shooter) featuring focus on memories of the protagonist to have an impact on the story of the game. And will be available in 2015

can watch video scan with a scene at the end of the game Thorskan and Trailer News Post

Source – Kotaku 1 2

Get Even Trailer

Thorskan Scan Sample

    

            

                     Games, Get Even, Thorskan

        




Sponsor:Amz-Store

ThinkPad X1 Carbon Specification Upgrades for 2014, screen resolution, Adaptive Keyboard.

ThinkPad X1 Carbon the notebook ThinkPad ultrabook laptop carbon fiber material is used ( launch price of 1,399 dollars ), but after it was first launched in mid-2012, it will not be updated again

Last

Lenovo X1 Carbon Capture Spectroscopy original shape adapted by the main switch to the fourth generation of Intel Core Haswell, adjust the screen resolution up to 2560×1440 (with a few models to choose from 1600×900, 2560×1440. do not touch, 2560×1440 touch), the battery up to 9 hours with Rapid Charge technology to charge the battery fully 80% within an hour, weight 1.3 kg ( Spectroscopy profile )

the software is Windows 8.1, a software Voice of the Dragon, and features a waving Gesture used to change the slide presentation

Another important change is the new QWERTY keyboard (again) called Adaptive Keyboard button on the top row (F1-F12) was changed from a real button with LED touch button which will change according to the situation. serves as the F1-F12 keys and control keys (like volume, brightness adjustment) video link from Engadget

New

ThinkPad X1 Carbon Pricing starts at 1,299 dollars on sale late Jan

addition, Lenovo has launched a new accessory. ThinkPad OneLink Pro Dock that acts as a hub for the various ports. To the notebook using a USB cable instead OneLine connector assembly sketch General docking station itself can act as a charging other devices with a price tag of $ 429

Source – Lenovo , Engadget

    

            

                     CES 2014, Lenovo, Notebook, ThinkPad, Ultrabook

        




Sponsor:Amz-Store

Lenovo released the ThinkPad 8 tablet Windows 8 inches for the business sector.

    

            

                    

        

Lenovo stage at CES 2014 to launch the new version from ThinkPad 8 8-inch Windows tablet that targets enterprise customers. (The same market Dell Venue 8 Pro )

Specification screen is 8.3 “1920×1200, Atom Bay Trail quad core, maximum capacity 128GB, Camera 8MP, supports microUSB 3.0, LTE, Windows 8 Pro

in terms of hardware, it is the keyboard – the outside to transform himself into a PC, the case of sales to the Tent Mode is similar to the Lenovo Yoga, prices start at $ 399 on sale in the U.S. starting late. Jan.

Source – Lenovo

Update Add Profile Specification

  • screen 8.3 “1920×1200, 10-point multi-touch
  • Intel Atom Bay Trail Z3770 Quad Core 2.4GHz
  • RAM 2GB LPDDR3
  • Intel HD Graphic Gen 7
  • 1x MicroUSB 3.0, x1 MicroHDMI, MicroSD
  • 3G/LTE version available
  • front camera 2MP, 8MP rear camera with flash
  • battery 20.5WHr, a long 8 hours
  • weighs 430 grams, the 3G version weighs 439 grams
  • thickness 8.8 mm
  • Windows 8.1 and Microsoft Office

    

            

                     CES 2014, Lenovo, Tablet, ThinkPad

        




Sponsor:Amz-Store

[CES 2014] Qualcomm shows Snapdragon 805: zoom with auto tracking, mixing flash and natural light.

Qualcomm Snapdragon 805 will demonstrate the power of photography to CES 2014 to demo the Optizoom by earlier news. also demonstrates Action Shot for zooming, automatic tracking and Chroma Flash for enhanced picture quality by mixing flash with natural light. Take a look at the news clips presented

Source: WMPoweruser

demonstration Action Shot

demonstration Chroma Flash

    

            

                     Snapdragon, CES 2014, Photography, Qualcomm

        




Sponsor:Amz-Store

Authentication: Ensure that the actual

process because very often identifiable by a certificate or identity. Authentication This process is often done unconsciously all the time. When the label tells a piece of the beam in the mall. We always check first if the products we are buying it directly on the product label or not. Or when we talk to someone over the phone. When we hear the voice of the people we talk to, we can ensure that people on the other side of the line are those that we intend to talk to you. When we had a letter of one, we check to see if the signatures or not. Traces and signatures are forged or not

as we do things. To ensure that disclosure, document, or thing is what we intend to discuss, read, or use those things actually. For computer These processes need to be clearly defined processes in advance

identity certification process in general. Certification generally classified into three categories:

    We know what

  1. To some secret knowledge, we can guarantee that the person we’re talking with are the ones we intend to discuss it. We may also ask to see the plays in the background in early childhood. In computers, we use a secret password always
  2. What we

  3. Thailand confirms the age-old drama separating the left butt cheek was red birthmarks using this process
  4. What we are

  5. What we are able to confirm our identity, such as fingerprint, DNA

these processes typically only a single process is sufficient for the identity certificate. But we have to believe that the process is actually effective, as no one can fake id card and have no one to steal people cards to use. We must not forget the password or tell anyone to know

in the real world These errors always happen. We may trust in the technology. Convinced that RFID cards are easy to fake, it can not be forged. We may be reckless password set as a birthday or write in notebook and leave it on the desk

process requiring high reliability, such as financial processes in the U.S.. It is recommended to certify the identity of financial institutions requires a certified check during the two categories above. Call this process multi-factor authentication

secret message The beginning of the certification

process of what we “know” is the most basic processes that we’ve done. When we need to access a web site. Those events tend to require a password to log on as usual

concept of passwords is that we are the only ones to know what the secret message. If someone is wearing the same secret message with us. Web and Services I believe that we are using the fact that access to services

secret message may be active as a group in such cases. Soldiers in the past may have been agreed in advance that if I do not know for the soldiers shouted a secret message. If you answer correctly, the same team. In the case of World War II. Are set to be yelling, “flash” if you do not know the parties and the military have to shout to hear that the “thunder”

password storage processes in computer systems today have been developed dramatically new systems often prevent anyone know the root password of the user, even the administrator themselves (see Chapter hash )

upic.me.

secret message is not intended to recognize users only. Get paid today as MasterCard SecureCode service began when the first application we need to configure a secret message to the MasterCard them (in the picture is a Personal Greeting) after that, every time we spend money. Web to get paid to bring us to the pages of MasterCard that page will display a secret message to verify that a web of MasterCard reality while also sending an SMS to us for us to send text messages from SMS back to you. the Web This process is certified identity either. What is the secret message is a message that something. Show that the actual web As we have cell phones that sign up to receive SMS sent out to show that we are indeed the card holder

CHAP user code, but no code

the password it works well only when the communication channel is intercepted easily. Communication early Telephone lines or other connections. There are not many people understand the technology. Vulnerable to being intercepted is not very high. But when technology is increasingly accessible. Eavesdropping of these processes, it is very easy. Eavesdropping code is going to be able to make the intercepted passwords to log in to the service in the future

concerns the eavesdropper is concerned first. Your internet connection Solutions designed and is still widely used today is so high that the CAHP (Challenge-Handshake Authentication Protocol) standards in RFC1994 This process random server messages do not repeat each time. Sent to the user When users enter a password, the computer will not send the password to the server directly. But put that password to connect to the server to randomly called up the challenge with MD5 hash, and then returns the server. This process makes the identity certificate. No need to send a secret message to honestly and if the server works correctly, it should be a challenge every time. Make the text used to certify the identity of all times as well

disadvantage of this process is that the server must store the password in a return to a password which is no disadvantage in many cases, the administrator can view passwords

SIM ensures confidentiality between

When CHAP is used to authenticate the user with a password. Mobile phone also has a certification process to “SIM card” similar SIM card so the secret is the size of 128 bits, called Ki numbers, no channel read out normally
certification process

SIM card to authenticate to the server called. authentication center (AuC) to store the IMSI number, used to identify the SIM card, all cards in the world, with Ki values ​​as well

AuC sends a random number (nonce) to SIM Card on a mobile phone SIM card is inserted. Put the SIM card to the SIM with the Ki hash out with COMP128 function then returns the hash back to the server. Server will hash functions with the same respect that match. If the SIM is to ensure that the correct physical connection to the phone

in fact the first version back COMP128 designed lax and confidential information can not be sure from the outside. But when the GSM network has been popular in no time. The researchers were able to reverse function successfully COMP128 results can roll with the Ki values ​​must improve as a possible solution so COMP128v2

process of GSM is still the major problem is the SIM can not verify that they were talking to a post that was true or not. Makes an attack with a pole fake (rogue tower) for GSM antenna may be a fake, these poles are not connected to any network, but with the AuC false certification through a SIM. Or it may be a trap up the middle to the GSM network connection icon it again one of these fake poles can eavesdrop a conversation

processes in the system that has been developed from GSM UMTS has been updated to the SIM card itself must certify the identity of the antenna as well. By the pillars sends the AUTN with random numbers. Sim card will be calculated for AUTN of random numbers provided. If the value does not match The SIM will not let the hash out and disconnect

process similar to the process of UMTS may be compared by MasterCard SecureCode both sides to recognize each other’s identity. Before embarking on any of the following

token accredited because they have a certification

certification process in case we did not know before. In everyday life We always guarantee identity with “a certified” or token (token) by what these certifications must be able to guarantee that those who hold it as their claims come true. In the case of Thailand, we continue to use the card as normal,

We believe

card because the card is generally assumed to be difficult enough. Clear film that is coated with a special plastic card that is reflective print out. These patterns are difficult to fake But lax monitoring Many times certain transactions did not check very well. And I believe the only copy of the ID card was made ambiguous identity certificate error passive

many products ensure that the product is genuine with similar processes with reflective stickers on counterfeit can be difficult. The number of products that match the product offered for sale. Make customers aware that the product you are buying is genuine

server system in a large organization. Or even an online multiplayer games typically have a “key” that holds the secret inside the chip that are difficult to read out. We call these keys the hard token (hard token) by calculating the internal clock. While Google uses software called Google Authenticator. Then get the confidential through reading QR-code when first registered it. The software is called a software token (soft token), it will make the cell phone. (Or other device) is becoming a certified our identity. When we logged in Instead of just asking a password. I would question the value received from these additional tokens. If we put the value of the token is valid, it suggests that we “have” to assure identity with the

PKCS certification because the secret to us

identity certification process has been very popular in the enterprise one is certified identity through a public key infrastructure (public-key infrastructure – PKI)

Normally when we talk about the certification process in the standard SSL / TLS, we use the web, we often used to ensure that we address it on a real web traffic. After that, the web, so we are guaranteed that by asking a password from us again, but TLS process that identifies the user authentication process instead. The user must hold the secret key and the certificate out

holding secret key and the certificate, the certificate must be signed digital signatures. (Which is encrypted hash value of the file with the secret key) with certification authorities. (Certification authority – CA) trusted. For general corporate The agency may also create your own CA for use. Or may use an outside agency, if building up the CA itself. The agency is also responsible for the distribution of CA certificates to all computers. They must be aware that this certificate is not forged in the way

secret keys and certificates for users. There are two options, is distributed as a. Standard known as PKCS # 12 file is a file, including certificates, digital identity, and a secret key. Once the server to certify the identity of the user connecting to. Server can request a certificate that contains a public key attached. Then a series of coded numbers and returns it to the user. User with secret key can decrypt the encrypted and then sent back to the server

server knows that the user is true because the “a” secret key of the certificate certified by certification bodies

many agencies do not favor the issuance of certificates and secret key to a file. I can copy easily. The choices we see as often is the use of smart cards. Instead the case file of the secret key and the key to open up the reading. Certification bodies to provide users with smart cards to one card. The smart card is a secret key inside, but can not be read out, but it has an API for the smart card to encrypt and decrypt data sent instead

upic.me

API of running smart identity cards to guarantee the current standard known as PKCS # 11 hardware variants. Sometimes the smart card with the same card we see. But sometimes it can be plugged into a USB flash drive shaped like a non-reader, smart card immediately

secrets in the process of PKCS # 11 is unusual in that it is a secret is a secret key per user, that holds the secret key itself. Certification process more tangible and therefore more reliable because the user typically does not copy the token to be. This process guarantees that there will be a single token

credit Safety begins with the “look”

certification process of paying another form of payment is accepted via credit card

[CES 2014] demonstration wave power signal processor Snapdragon 805 Ultra Sound of the stylus.

Qualcomm will demonstrate the use of tablet prototype chip Snapdragon 805 at CES 2014 which can capture the position of the tip of a pen writing on the real paper of ultra sound waves

pen stylus with the tablet in general. Is to use the pen to write on the screen of the tablet directly. Which tablet can recognize the position of the pen to touch it with the same approach to the recognition of the user’s fingertips. (For capacitive touch screens will be recognized by the change of the electric field proportional to the capacitance in the area. Of screen space)

But

Tablet Ultra Sound NotePad at Qualcomm created to demonstrate the effectiveness of the Snapdragon 805 chip inserted internally. The new way to make extra rate. And movement of pen stylus pen via the transmit signal in the form of ultra sound waves

on the Ultra Sound NotePad put pen to write or draw directly on paper. The tablet can display text or painting it as is at the same time the user is writing or drawing things. This capability allows the user to copy the digital information immediately. (Apart from some pen device that records user’s drawing or writing. Before forwarding such information to the computer later), which will make it more convenient than photography or scanned into the computer later

must follow that in this CES 2014 will leverage Qualcomm’s quips. Otherwise, show me again the power of Snapdragon 805

Source – SlashGear

    

            

                     Snapdragon, Qualcomm, CES 2014

        




Sponsor:Amz-Store

Samsung launched the Smart Home for intelligent home. Appliances to talk to each other

Samsung launched a brand

Samsung Smart Home platform for electrical appliances and gadgets of Samsung (and Partners) can talk to each other

ultimate goal of Samsung Smart Home is a home owner can control various appliances. Through a single device (eg smart phone or Galaxy Gear) by Samsung to provide the platform and the server provides. Important parts of the Smart Home platform consists of three parts:

  • Device Control using portable devices to install apps or Smart TV Smart Home control home appliances such as air-conditioning, lighting both indoors and outdoors. This service is designed to connect to a work order, no matter where the user is. It also supports voice commands (ie saying “going out” Top Gear, it turns off the lights in the house)
  • Home View all images from a camera of various electrical appliances. Remotely
  • Smart Customer Service alert homeowners when appliances are broken or need replacement parts. And allows us to service after sale

Samsung also developed a new protocol called Smart Home software protocol (SHP) to communicate with the device, the Samsung Smart Home Services will begin service in the first half of this year

Source – Samsung Tomorrow

Samsung Smart Home

    

            

                     Samsung, CES 2014, Internet of Things

        




Sponsor:Amz-Store