Tuesday, 26 November 2013

Northwestern Lightboard

Northwestern Lightboard by Michael Peshkin

"The Lightboard is a glass chalkboard, pumped full of light. It's for taping online lectures. Your writing on the lightboard is bright and readable, and you face toward your students".

Source: Northwestern Lightboard

Sunday, 6 October 2013

Seabreacher Australia's X-Model Submersible Watercraft

Saturday, 25 May 2013

Talent Spy: A better scouting software

by Flashopen

The Portuguese software company F3M Information Systems wants to create the best software's for talent discovery and football management ever!

Portugal has been giving an amazing contribution to the world of football like the best football coach in the world (José Mourinho), one of the two best football players in the world (Cristiano Ronaldo), the best referee in the world (Pedro Proença) and one of the top five football-school worldwide (Sporting Clube de Portugal). João Almeida, one of the F3M managers, said to the news-agency Lusa that Talent Spy (their scouting-tool), will be soon one of the most used software around the world.

Talent Spy is now being launched in Portugal, England, Germany and Brazil. Next year, 17 other countries (including Spain, France, Holland, China, United States, Argentina and South Africa) will join.

Talent Spy is an absolutely innovative what concerns its target-group specifications as well as it is intended to democratize the scouting by attracting new and young football talents. Talent Spy is also the ideal tool for management and monitoring by professionals in this area worldwide.
You might like to check their page on Facebook.

Source: Sapo Desporto

Saturday, 27 April 2013

Covilhã will debut street that generates electricity

by flashopen

A treadmill and part of the promenade will start producing energy to power lights and neon signs of Covilhã. It is the premiere technology startup Portuguese Waydip.

Waydip is a startup that develops cleantech R&D projects. The main project, Waynergy, transforms people and vehicles kinetic energy into electricity.

According to the Public, the first installation of Wayenergy should use two forms of energy production: the first aimed at harnessing the strength and weight exercised by passersby (at the crosswalk and sidewalk contiguous) and a second that is installed under the humps that flank the walkway, and that aims to generate electricity from the force exerted by the passage and the braking of the car.

The electricity generated by routine movements of the urban space will be used to support the operation of light panels and traffic-lights. Besides supplying power to devices, urban Wayenergy may provide, very soon, power to the entire city electric network.

The City Hall of Covilhã therefore admits being able to install this technology in other parts of the city in order to increase production and reduce energy bills paid for electricity consumed by the various urban facilities an equipments.

The solution created by two former students of the University of Beira Interior (UBI) has been targeted for patent valid worldwide. Since 2010 to the present, the Waydip already won three awards related to innovation!

Source: Exame and Waydip

Wednesday, 27 March 2013

Muse video-contest winners

Two Portuguese were the winners of the world-contest to create the music video "Animals," by the British band Muse, according to their official page on Facebook: "Your votes have been counted, the band decided and we all agree that the excellent version of 'Animals', by Inês Mendes and Miguel Freitas from Portugal, is the winner".

Speaking to TSF radio, Inês Freitas explained that the video is unique in the history of Muse, for being an animated video and it is focused on the theme of the music, which is intended to be a strong critic to the unbridled capitalism and greed.

The two Portuguese are students of Animation and Multimedia Design of the Polytechnic Institute of Portalegre, that has also reported the news in its official website. The award ensures to the two Portuguese 3,000 pounds (about 3,500 euros), according to the announcement by the Muse when the contest launched last December.

The video will also be displayed in one of the Muse concerts next summer. The Muse will perform in Portugal on the 10th of June in the Dragão Stadium in Oporto.

source: @Lusa, 20 of March, 2013

Tuesday, 26 March 2013

Obrigado or Obrigada?

The word "Obrigado/a" (Thank you in Portuguese) is a participial form of the verb "to oblige" and, as such, admits flexion in the feminine, as with "Agradecido/a" (grateful), of the verb "Agradecer". Thus, a woman can legitimately say she is, or how she feels, "muito obrigada" (thank you so much / much obliged) for a favor that someone has done to her.
However, in the case of an interjection, it is also natural that many people resist the idea of ​​flex it in the feminine, since the interjections are invariable.
From this point of view, being a man or a woman, they both can simply say "Obrigado" with the same ease they say "hello", "goodbye" or "hi".

There is therefore room for some ambiguity in the interpretation of the term, as this is seen as participle as verbal or interjection.

The problem is that consulting a dictionary does not always help us to decide what to do (in this case, to say "Obrigada" or "Obrigado"). The Dictionary of Contemporary Portuguese Language Academy of Sciences, for example, presents "Obrigado" (in the masculine) as interjection (accordance no. 3) and at the same time, presents its example in the feminine ("Obrigada, she said"), contrary to the principle that interjections are invariable.

In short, the bending is legitimate, for etymological reasons, but perhaps it will be lost due to the class of which the word is now affected when it is used as an expression of gratitude.

by S. Leite
Superior Institute of Education and Sciences, Lisbon

In nowadays, and according to my experience as a Portuguese fellow, the difference between masculine and feminine versions of the word has lost its importance as it is used in an aleatory manner with no problem at all. Yet, the difference between "Obrigado" and "Obrigada" has been pointed in many sites and forums, specially in Brazilian ones, which do state its use as "Obrigado" should be used by men and "Obrigada" by women.

by Flashopen
Journalist and blog owner, Eindhoven

Tuesday, 19 March 2013

New first stop for hacked site recovery


We certainly hope you never have to use our new Help for hacked sites informational series. It's a dozen articles and over an hour of videos dedicated to helping webmasters in the unfortunate event that their site is compromised.

Overview: How and why sites are hacked

If you have further interest in why cybercriminals hack sites for spammy purposes, see Tiffany Oberoi’s explanation in Step 5: Assess the damage (hacked with spam).

Tiffany Oberoi, a Webspam engineer, shares more information about sites hacked with spam

And if you’re curious about malware, Lucas Ballard from our Safe Browsing team, explains more about the topic in Step 5: Assess the damage (hacked with malware).

Lucas Ballard, a Safe Browsing engineer, and I pretend to have a totally natural conversation about malware

While we attempt to outline the necessary steps in recovery, each task remains fairly difficult for site owners unless they have advanced knowledge of system administrator commands and experience with source code. For helping fellow webmasters through the difficult recovery time, we'd like to thank the steady members in Webmaster Forum. Specifically, in the subforum Malware and hacked sites, we'd be remiss not to mention the amazing contributions of Redleg and Denis Sinegubko.

How to avoid ever needing Help for hacked sites

Just as you focus on making a site that's good for users and search-engine friendly, keeping your site secure -- for you and your visitors -- is also paramount. When site owners fail to keep their site secure, hackers may exploit the vulnerability. If a hacker exploits a vulnerability, then you might need Help for hacked sites. So, to potentially avoid this scenario:
  • Be vigilant about keeping software updated
  • Understand the security practices of all applications, plugins, third-party software, etc., before you install them on your server. A security vulnerability in one software application can affect the safety of your entire site
  • Remove unnecessary or unused software
  • Enforce creation of strong passwords
  • Keep all devices used to log in to your servers secure (updated operating system and browser)
  • Make regular, automated backups of your site
Help for hacked sites can be found at www.google.com/webmasters/hacked. We look forward to not seeing you there!

Written by Maile Ohye, Developer Programs Tech Lead

Thursday, 28 February 2013

Trino, The Enchanted Instrument!

by Flashopen

Trino is an electronic bagpipe. It produces the same sound of the traditional instrument but is autonomous, small and easy to carry. It is a kit that allows you to rehearse or to practice in a very convenient way as you can control its volume. You can play Trino everywhere basically, outdoors, at home or even in the library! It is an easy-to-play instrument, therefore accessible to everyone.
Learn more about this excellent project at http://massivemov.com/trino

Friday, 1 February 2013

Tips To Prevent Credit Card or Debit Card Fraud

Credit card, Debit card Fraud what to do? Plastic card frauds are increasingly common these days because of booming online shopping and online scams. Few days back one such incident happened to a very close friend of mine. He got a call from an unknown person stating him that his debit card was misused by someone from United States for a hotel transaction and the bank system has found it fraudulent to block the transaction. The person also asked the bank account number and his debit card pin so that he could block the card. But my friend refused and went to the nearest branch where he has the account and inquired about the details. The support staff at the bank reported that there is no such frauds happened through his debit card and everything is under control.
To be on the safe side, he took few steps to prevent the debit card from being hacked in future.
1. You should submit a written complaint mentioning debit card abuse along with the phone number (fake call) which you got, so that in future it might help to register the cyber complaint.
2. Next step is to change the debit card pin number, internet banking pin number, internet banking account password, verified by visa password etc.

credit card fraud (1)

What to do if my debit card or credit card is stolen? You can block the card, apply for a new card.
What if someone has misused your debit card or credit card, you can go to your bank, block the card first and give a written complaint mentioning the transaction date and amount. The amount will be credited back in 2-3 days.
In the above scenario, if you feel someone has hacked your internet banking account, you can block the account for a while (temporary blocking), apply for a new registration of internet banking and then override the old internet banking account.
Applying for a new debit card is good solution if you find that your card is hacked. Bank account and debit card do not match. So canceling the fraudulent/stolen card and applying for a new card can stop fraudulent activity.
There is one major difference using Debit cards vs. Credit cards. On debit card, if someone misuses on fraudulent transaction, the money from your account is debited instantly. The misused amount will take some time to get reimbursed too. The time taken will be from 15 days to 2 months. With Credit cards if you find fraudulent charges on the bill, you can simply decline the charges and not pay the bill. So it is much safer when you use credit cards for online transactions.

credit card fraud (2)

For Debit card users, be careful when you use an ATM machine which has outdoor lock. It means you need your debit card to swipe to unlock the door to get inside the ATM. In this scenario, Skimming is possible. Skimming ATM is a practice of capturing your debit card information by running it through a machine that reads the card’s magnetic strip. When you swipe your card to unlock the door, it records all your card information and sends it to the hacker. Before you even get home, your account is at risk. Even if the thief doesn’t get your debit card PIN, he may be able to duplicate the card’s magnetic strip and use if for “Sign and Swipe” Visa or MasterCard transactions.

How to Protect Yourself from Credit Card or Debit Card Fraud?

You should be careful when you use your plastic card both online and offline. There are few more techniques to hack your card offline and when it comes to online, there are million phishing techniques to capture your card details. Always before you enter your card information online, check the URL at the address bar, make sure it is a genuine e-commerce site and know who you’re doing business with.
1. Monitor your financial statements regularly.
2. Activate SMS alerts for all the transactions in your account.
3. If you find something unfamiliar activity, report it immediately. Freeze your account.
4. Change your PIN, Passwords of internet banking monthly.
5. When you do online transactions, pay with your credit card. It has better security and guarantees.
6. You can set alert for your debit cards when your account dips below a certain balance.

credit card fraud (3)

Recently I read at Hackstreet India about a Credit card fraud happened to a small e-commerce website. The scene goes like this – A user purchased a product from the website using his friend’s credit card. The shipping address and the billing address are different. The product has been shipped and few days later, the online shopping site receives a chargeback request from the original credit card holder saying that the given transaction was never carried out. The company has called the buyer many times and none of the phone calls and emails attended. How to solve this issue? Here are some answers…
1. You can dispute the chargeback with gateway provider by furnishing the proof of delivery within reasonable time.
2. You can also contact Cyber Crime Cell and file a case against the buyer.
Still the answers are pouring in. If you have a solution to the issue, do record your thoughts as comments below.

Tips To Prevent Credit Card or Debit Card Fraud is a post from: Madras Geek

Thursday, 31 January 2013

#Me: Instagram Narcissism And The Scourge Of The Selfie


Those of us who use Instagram everyday like to think of it in glowing terms. Not only is it a rapidly-growing social media success story, but it's a place where we can go to see gorgeous, often creatively composed imagery. Our friends are there, documenting their world for us and reliably tapping the Like button every time we share our own photos. It's awesome.
That is, until you take a step back and look around
As it turns out, Instagram is a breeding ground for many people's most narcissistic tendencies. It's a reality that comes into sharp focus as soon as you step outside of your circle of friends and look at what everybody else is posting. Turns out that as a group, Instagrammers are a pretty self-absorbed bunch.
Sure, you might say, we knew this. Mirror-shot, pouty-faced self portraits of teenagers find their way to the "Popular" (now called "Explore") tab as often as sunsets, celebs and food pics. But Instagram narcissism is more than a stereotype. There's actually data to back it up.

90 Million Selfies... And Counting

Consider this: The third most frequently used hashtag on Instagram is #me. Under it, you'll find more than 90 million self-portraits taken primarily by younger users, very few of them with any irony, or even much creativity.
Of course, there's nothing inherently wrong with publishing self portraits. After all, your appearance is very significant part of the life you're documenting using social services like Instagram. Taken tastefully and periodically, the "selfie" can add personality and context to oyur never-ending streams of lattes, power lines, cats and skylines. And sure, just like in the real world, everyone likes the ego boost we get from the compliments.
Scrolling through the #me photos, you see images of varying quality, all displaying faces of different people. In a way, it's kind of fascinating to peruse. Here are all these people, broadcasting their own image to the world. In one photo, you'll see an American kid with his collar popped and earbuds in, probably shirking some school-related responsibility. In the next, there's a Saudi Arabian man dressed in a traditional gutra headdress, snapping a self-portrait in the mirror. Some people have new haircuts. Some have new babies. One guy has several large nuggets of marijuana.
Some of these images feel a little too intimate. As you scroll through, you start to get the feeling that you're peeking through a window of a world you're not quite supposed to have access to. But mobile and social technology have given us millions of little windows into the worlds of others, so we keep scrolling.
The stream exposes nothing explicit, but it's peppered with what feels like far too many young, teenage girls laying in bed. Or 15-year-old boys standing shirtless in front of a mirror. Some of these kids are showing skin. Just about all of them - male and female alike - are seeking some kind of approval from their peers and the larger community, which thanks to the Internet, is now effectively infinite.

The Rise Of The Narcissistic Social Media Star

Some are getting the approval they're seeking in a big way. Michael Saba is a 15-year-old from Boca Raton, Florida, whose Instagram photos often find their way to the app's Explore tab among teen pop stars, professional athletes and professional photographers. But despite his 45,000 followers and hordes of teenage fans, Saba is not a celebrity. He is, as his Instagram profile says, "just a kid who takes pictures."
Saba's photo stream is comprised entirely of self-portraits, each one garnering between three and five thousand likes and hundreds of comments, mostly from adoring teenage girls who fawn over Saba with almost Bieber-esque intensity - and shower him in heart-shaped Emojis. The pictures are not particularly interesting or varied. It's just him, in similar-looking outfits, day after day. Sometimes in the mirror, sometimes making well-rehearsed "cute" faces directly into his phone's camera. Quite often, Saba poses with two other friends, also heartthrobs. Every photo is a massive hit. Meanwhile, he follows only one other user.
In our weird new world, it's not uncommon for young people to achieve this new type of psuedo-fame, fueled solely by social media. And we're not just talking the type of notoriety you can get from a viral YouTube video, which tends to require at least a sliver of talent, humor or skill. Instead, these kids are amassing huge followings just for being attractive. It's like a high school popularity contest on digital steroids, but this homeroom has more than 45,000 kids in it.

Instagram And Self Image: Is The Impact Good Or Bad? 

Is this necessarily a bad thing? One has to wonder what this kind of existence must do to the ego of a 15-year-old kid. Or the weird new social dynamics it could produce at school. But some psychologists think that the self-image boosts offered by social networks like Instagram could be a good thing.
It used to be that most of the photographs of other people we encountered were carefully crafted images of the flawless-looking individuals portrayed in popular media and advertising. Psychologists have long had concerns about the distorted effect that's had on normal-looking people's self images. Instagram and mobile photography more generally may be changing that.
"I like to think that Instagram offers a quiet resistance to the barrage of perfect images that we face each day," writes Sarah J. Gervais in Psychology Today. "Rather than being bombarded with those creations… we can look through our Instagram feed and see images of real people – with beautiful diversity."
Of course, as Gervais acknowledges, there hasn't yet been much research into what sort of impact Instagram in particular is having on self image or anything else. Indeed, when I reached out to Microsoft's Danah Boyd and several other academics who study social media and its affect on society, I wasn't able to turn up much.
The psychological impact of technology more generally has been a popular topic for a few years now. Narcissistic personality disorder has been on the rise for 20 years, according to a paper coauthored by Dr. Larry Rosen, who also wrote a book called iDisorder: Understanding Our Obsession With Technology and Overcoming Its Hold On Us.

Some research suggests a correlation between social media and narcissism, but the condition's increase long predates the rise of smartphones, says Jean Twenge, a researcher at San Diego State University who studies issues related to social media.
"It's probably both that higher narcissism causes people to use social media in narcissistic ways, and that some social media causes higher narcissism," says Twenge. "But it's definitely a two-way street."

Wednesday, 30 January 2013

2013: Full Speed Ahead for Adobe Gaming!


As we move into 2013, we’re excited to make investments that support the incredible, ongoing momentum in social and mobile gaming that Adobe has championed for more than a year. Flash technologies underpinned the success of many game developers from Fresh Planet to Zynga, both in the browser and on mobile, and you can see how Adobe Gaming technologies deliver the reach needed to improve game monetization in the graphic below.
In December, the Adobe Gaming team launched the first ever, packaged Adobe Game Developer Tools via the Creative Cloud. Within 2 weeks of their availability, we had over 20,000 downloads of the tools and more than 12,000 views of the Adobe Scout video! Today, we’re making it even easier for game developers by removing a key barrier to delivering games targeting Flash Player – from this point forward, the XC APIs are no longer classified as a Premium Feature for Flash Player, which means developers can use them royalty-free without a separate license from Adobe. Developers and publishers that have published content using the XC APIs do not need to make any changes to their content to reflect this change in status for the XC APIs, and we expect this adjustment to make it even easier for developers to use Flash and AIR as their cross-device game development workflow of choice. To find out more, check out the updated FAQ here.
In addition, we’re also announcing added funding for the Away Foundation, a non-profit Community Interest Company based in the UK, focusing on building and maintaining free and open source software resources for online and mobile games and applications. This funding will support the development and release of Away3D 4.1 and an exciting new open source project for Away Builder. Away Builder 1.0 is the first open source tool project for the foundation, and will provide a visual tool for designers that exposes and edits custom Away3D settings and object properties on 3D assets without the need for coding. And just last week, we updated the Gaming SDK, which includes the latest Away3D, Starling and Feathers frameworks as well as updates for the latest runtime releases. Working with Away has already produced several exciting advances for game developers using Adobe technologies and will continue to forward the delivery of rich games targeting mobile and the browser for years to come. Starforce Delta is a great example of a beautiful 3D RPG built with Away3D and now available on the web in open beta and coming soon as a mobile app. And if a touch of the 19th century is more your thing, check out Jane Austen Regency Dressup, as well as other games using the Away3D framework on the Away3D showcase.


We also wanted to highlight a handful of great games that really reflect the breadth of creativity using Adobe Gaming technologies and show off the skills and passion of the developers who made them. Four games using Adobe Gaming technologies were recently announced as Independent Game Festival (IGF) finalists! Incredipede, a beautifully illustrated browser-based game; Dys4ia, an autobiographical game about undergoing hormone replacement therapy as a trans woman; Intrusion 2, a sci-fi action platform game; and Super Hexagon, a fast-paced reflex game where you’ve gotta be great to survive 20 seconds.
And just in case you didn’t get your fill of zombies in 2012, check out GREE’s Zombie Jombie in the iOS App Store. GREE used PhoneGap Build – another Adobe Gaming technology – for this wildly addictive RPG card game that will surely have you selling for brains. It’s shaping up to be a wide open year ahead for Adobe Gaming, and we’re looking forward to conquering new worlds with you!

Monday, 28 January 2013

Adeus Beatriz. Até à vista!

Koningin Beatrix bijna 33 jaar staatshoofd van Nederland
Foto: ANP

A Beatriz despediu-se. 

Depois de ter reinado a Holanda durante 32 anos e nove meses a rainha decidiu reformar-se.
Apenas a sua mãe, a rainha Wilhemina e Willem III ocuparam o trono holandês por mais tempo.
A sua mãe reinou por 50 anos e Willem III por 41 anos.

Hoje, às 19 horas a rainha Beatriz supreendeu a maioria dos holandeses com a sua aparição na NOS (canal televisivo), declarando a sua retirada do trono Holandês.
O seu discurso foi curto e simpático.

O trágico acidente do Príncipe Frísio no ano passado está ainda bem presente na consciência dos holandeses. Assim, a rainha agradeceu-lhes a soliedariedade e a confiança.
Encerrou as suas declarações por voltar a agradecer a oportunidade que os holandeses lhe deram de ser a sua rainha. Lindo!

Willem-Alexander, seu filho primogénito sucederá ao trono.
No dia 30 do mês de Abril, ou melhor, no Dia da Rainha, o Guilherme-Alexandre irá aquecer o trono com uma coroa na cabeça. Passará a chamar-se rei Willem IV... ou Alexander I