TECHNOLOGY INFO

Tablets to Become Irrelevant in Five Years, Says BlackBerry CEO

MOVIE NEWZ

Box office battle: 'Heat' vs. 'White House Down'

HEALTH INFO

5 Signs You Might Be at Risk for Diabetes

GAME ZONE

Disney Infinity preview: 'a digital recreation of playing with toys'

CELEBRITY INFO.

Arctic Monkeys confirm UK tour dates

What Health Insurance D o e s n ’ t D o

IN one among the foremost noted studies of insurance, conducted across the Nineteen Seventies, thousands of participants were divided into 5 teams, with every receiving a special quantity of coverage. The study, go by the RAND Corporation, tracked  the medical aid every cluster wanted out, and not astonishingly found that individuals with additional comprehensive coverage attended build use of it, visiting the doctor and checking into the hospital additional typically than individuals with less generous insurance.
But the study conjointly tracked  the health outcomes of every cluster, and there the results were additional surprising: With many modest exceptions, the extent of insurance had no vital result on the participants’ actual upbeat.

Samsung Galaxy Note 4 Arrives Oct. 17

The Galaxy Note 4 will come in Charcoal Black and Frost White in the U.S.; other colors are available around the globe.
 
Samsung
The Galaxy Note 4 will go one sale at all the major U.S. carriers Oct. 17, giving phone buyers a chance to compare Samsung’s newest phablet directly against the iPhone 6 Plus.
The 5.7-inch Note 4 has an impressive 2560 x 1440 pixel Super AMOLED screen and a 16-megapixel camera with optical-image stabilizer. The Note comes with Samsung’s S Pen stylus.
The Note 4 isn’t waterproof like its smaller sibling, the Galaxy S5, but it does have another superpower. This fall, it becomes the engine for the Gear VR headset, a virtual-reality scuba mask powered by Oculus technology that lets you immerse yourself in nature scenes, space battles and Matrix-like environs without leaving your chair. You can even use it to watch the equivalent of a 65-inch TV, though the resolution isn’t as good as Samsung’s curved 4K flagship. (The Gear VR will be sold separately; Samsung hasn’t yet announced its price or specific ship date.)
There’s no word yet from Samsung on the Note Edge, a variant of the Note 4 with a screen that cascades down the right side, for at least one really useful purpose.

How to Clean Up Your Computer & Make it Run Faster

The more you use your computer to download, save or transfer content, the slower it becomes, so running optimization tools can clean up your computer and make it run faster. Performing optimization and maintenance steps can increase your computer's longevity and improve overall performance. With Windows computers, several cleanup and repair tools are at your disposal. These tools, which come with the operating system, remove unnecessary files and repair the hard disk to increase speed.


Instructions

Disk Cleanup

1
Click the "Start" button, type "Disk Cleanup" (without quotes) in the search field, and then click "Disk Cleanup" from the list of results. If prompted, enter your administrator password to launch the Disk Cleanup tool.

2
Click your computer's hard drive from the Drives list and click "OK." Windows analyzes the hard drive and displays a list of file types that are safe to delete.

3
Click the check boxes next to the file types you want to delete and click "OK." Click the "Delete Files" button to confirm your selection. Windows deletes the unnecessary files automatically.

Disk Defragmentation

4
Click the "Start" button and type "Disk Defragmenter" in the search field. Click "Disk Defragmenter" from the list of results, and enter your administrator password if Windows asks for it.

5
Select your hard disk under "Current status," and then click the "Analyze" button to determine if your hard disk needs to be defragmented. Wait for Windows to analyze the disk. When the process completes, locate the Last Run column. If the number in this column is above 10 percent, defragment your disk.

6
Click "Defragment disk" and enter your administrator password if Windows asks for it. The defragmentation process starts automatically. The defragmentation process may take several minutes or hours depending on the extent of the fragmentation.

Error Checking Utility

7
Click the "Start" button and click "Computer" to launch Windows Explorer.

8
Right-click the "C:" drive and click "Properties." Click the "Tools" tab and click the "Check now" button under Error-checking.

9
Enter your administrator password if Windows asks for it, and then click the "Automatically fix file system errors" check box for Windows to automatically repair your hard disk. Click the "Scan for and attempt recovery of bad sectors" check box to perform a thorough check for physical errors on the drive. Select both check boxes to check for and repair file and physical errors.

10
Click the "Start" button to run the disk repair utility. The utility runs automatically and repairs disk problems. The disk check utility attempts to repair physical errors automatically.



11
Plug a flash drive or memory card into your computer.

12
Click the "Speed up my system" button that appears in the Autoplay dialog box that launches when Windows detects the removal drive. The drive's Properties dialog box launches.

13
Click the "ReadyBoost" tab and click the "Dedicate this device to ReadyBoost."

14
Click "OK" to save your changes.



Protecting Your Phone from Malware ?

Dealing with a virus or malware has long been accepted as an unavoidable part of life when it comes to using a computer. But what about on your cell phone? While not all that common today, malware on phones is increasing, and you should get to know what puts your security at risk.

Passcode, Smishing and Wi-Fi

Your smartphone is a very personal device. We all share and store very private things on our beloved device. Indeed, for many of us, a phone is just about the first things we reach for when we wake up, and the last thing we look at before falling asleep.
So, why don't most of us take the time to set up a password on our phone to protect private information, should the device become lost or stolen?
Setting a password on an Android or iOS device takes but a few minutes, but it will prevent your personal information from being accessed should your device end up in the wrong hands. Not only does this simple passcode prevent someone from accessing your info, but it also prevents anyone from installing unwanted apps while it's not in your control.
Here's what to do:
On an iOS device, tap "Settings," then tap "General," followed by "Passcode Lock." You can set a 4-digit numeric password, or turn off the "Simple Password" option and enter a longer, alphanumeric password.
On most Android devices you can set a passcode by launching "Settings" and then selecting "Security." Depending on the version of Android, you'll likely see a few different passcode methods. Select the one that works best for you.
From time to time you might receive a random text message claiming to be from Target, Best Buy, Wal-Mart or another major retail chain. The contents of the text message claim you've won a free gift card or a free device of some sort. There's typically a link in the message for you to visit and claim your prize. This is known as "Smishing."
Delete the messages without opening the link -- it's likely that this leads to a malicious website. Not long ago, this sort of exploit -- just clicking a link -- was used by the iOS Jailbreak community to gain access to the root system of an iOS device and install custom software. The same type of exploit could be used to steal information or install malware on the device.
Wi-Fi is another potential point of entry for malware and data theft. On an insecure public Wi-Fi network, anyone with the right software can intercept data you're transmitting across the Internet. This included user names, passwords, credit card numbers, and e-mail address. One solution: Whenever you're on a Wi-Fi network, use a Virtual Private Network (VPN). There are VPN apps available for both iOS and Android, ranging from free for a set amount of bandwidth to a pay-per-use setup. Search the Play Store or the App Store for "VPN" to find an app that works for you.

A Map of Your Life

(photo: Jason Cipriani)

Snapping a photo using your smartphone and posting it to Twitter or Facebook may seem like an innocent behavior, but it's actually a gold mine of information about you.
Here's what you might not realize: Your smartphone geo-tags your photos with your exact location using GPS. Once the photo is public, anyone with the right know-how can extract that information from the photo and find out where you live, where you work, or where your kids to go school.
If the idea of plotting out your life on a map using photos isn't something you like, you can disable the location services for your phone's camera app. On an iOS device running iOS 6 and up, find it under the "Privacy" option in "Settings." Using Android, location control varies depending on the version of Android you're running; a good place to start looking is in the settings of the Camera app itself. On my Nexus 4 running Android 4.2.2, there's a "Store Location" option I can turn on or off at will.
Keep in mind that photos aren't the only way to unwittingly share your location. Facebook and Twitter add your location to each tweet or status update by default. You have to opt-out of sharing your location with the respective services through your account settings page.
And lastly, sharing your location using a service like Foursquare is a fun way to let your friends know where you are and what you're doing. But pushing those check-ins to a social network, or accepting random friend requests is a convenient way of letting crooks know when you aren't home.

Be Aware of App Permissions

Both the App Store and Google Play represent a "safe" place for users to download and install apps. While most apps are harmless, from time to time there some bad app(le)s.
When it comes to installing apps on your phone, make sure you're downloading from a trusted developer. Read some reviews and pay attention to the app permissions it requests (on Android). If a game is requesting access to your contact list, for example, you might want to think twice about why on earth they'd ask for such a thing. It could be something as harmless as sending out an SMS of a new high score to your friends, or it could be for malicious reasons.
For iOS users, you don't know what permissions an app is going to request until the app needs to access something in particular. For example: Suppose you download the Twitter app and set up an account. The first time you try to post a picture, a prompt will ask you to grant Twitter permission to access your photos. If you want to find friends from your contact book who are also using Twitter, another prompt will show up asking you to grant the app permission. The same type of prompts will show up for Location, Reminders, Calendars and Bluetooth Sharing. At any time you can review which apps have access to data on your device by launching the Settings app and tapping on "Privacy."
Some Android and iOS users like to "root" or "jailbreak" their phones so they can do more than the manufacturer intended. When you hack your phone in this way, the sky is the limit -- but it comes at a price.
If you jailbreaks (iOS) or roots (Android) your phone, it creates a potential security threat. Any iOS-savvy hacker knows that the default password for root access to a jailbroken device is "alpine." Needless to say, you should change the password if you decide to jailbreak your iOS device.
Android users don't have to change the root password; instead, they need to be aware of what apps are requesting super user permissions (in other words, root access).
Once an app, malware or not, has root access, it can do anything and everything it wants to do with your device and the data stored on it.
As time goes on, the need to better protect our smartphones from malware, viruses and other sophisticated attacks will only increase. For now, a little bit of research, some forward thinking, and common sense will go a long way towards keeping your device safe.


How to Convert a Laptop to a Touch Screen

One of the advantages of using touch screen laptops or tablets is that they make it easier to perform daily computing needs. Many companies use touch screens to eliminate the need to tap on keyboards in order to write words or jot down quick notes. Using touch screens also provides the flexibility of writing or drawing shapes that are difficult to produce using keyboards. A PC Tablet or a touch screen laptop can be very expensive to buy, often costing twice the price of a regular laptop. Fortunately, there are innovations that make it possible to convert a regular laptop screen into a touch screen at a very affordable price, one of which is a product called Navisis Laptop Pen PC Tablet


Things You'll Need

  • Navisis Laptop Pen PC Tablet package
  • Microsoft Windows 2000/XP/Vista operating system



Instructions

Installation and Using Laptop Mode

             1
         Check for systems requirements and compatibility. It is important to note that this system is   only compatible with Microsoft Windows 2000/XP/Vista operating systems. The package includes a station, which receives ultrasonic and infrared signals from the digital pen, a wireless digital pen or stylus, a station clip to attach to the laptop screen, a plastic screen protector that can fit up to a 15-inch wide screen and a USB cable to connect the station to the laptop's USB port.

  •          2
  •          Place the plastic screen protector by clipping it onto your laptop's screen.

             3
    • Clip the station or transceiver on either side of the laptop screen. Choose the side closest to the USB port to make sure that the USB cable will reach it. Attach the USB cable to the USB, with the thin or small end connecting to the Navisis station and the fat or big end to the USB port.

      4
      Download the Navisis laptop pen tablet PC software to your laptop. Click on the laptop pen icon on the lower right hand corner of the task bar using the stylus pen after software installation.

      5
      Set up your work area. Select laptop mode from the menu. Adjust the work area. Choose the option that matches your laptop's screen size, defined by the X and Y axis. For example, choose 14.3 inches if that matches your screen's dimension. Then, click "OK."

      6
      Synchronize the cursor with the tip of the pen. Place the tip of the pen against the "X" mark on the screen. Use the arrow keys on your laptop's keyboard to make sure that the "X" is at dead center. Then hit the "Enter" key on your laptop's keyboard.

      7
      Start using the system. You can test it with any Microsoft Office application. Use it on MS Word, Excel, PowerPoint, Outlook and Internet Explorer to type words, numbers and any characters. For example, in using Word, click on "Ink On," located on the upper menu of MS Word. Write on the screen using the stylus pen freely. Then save your document when done by clicking "Save As" and naming the file.

    Using Tablet Mode

           8

               Remove the station/transceiver from the side of the laptop screen. Place it flat on the table or desk. 
    • 9
      Clip a piece of blank paper using the station/transceiver.

      10
      Click on "Tablet Mode" using the stylus pen.

      11
      Replace the stylus tip with an "ink" tip, which also comes with the package.

      12
      Open MS Word or any MS Office application.

      13   
      Write on the blank paper using the stylus pen with the ink tip. The words, numbers or any characters you write on the paper should also appear on MS Word on your screen. Use tablet mode if you want to draw from a piece of paper and you want what you draw to be entered into your computer.


     

    Cloud Storage Compared: Choosing the Right Online Storage

    Online, or "cloud" storage has replaced the floppy disk as a way to share files, and it's also a handy way to back up files and sync them with your various computers and mobile devices. Here's a look at the various cloud storage services and what they have to offer. Read on to compare services and find the best storage solution for your needs.


    Dropbox
    One of the biggest names in online storage is Dropbox. Offering free, Pro, and Team accounts, Dropbox starts at 2GB (free) and goes up to 1TB (Team). Pro accounts offer 100GB of storage for just under $10 per month. But few people have to settle for the minimum storage; you can easily earn free storage by completing tasks such as going through the getting started guide, connecting your Twitter or Facebook account to Dropbox, inviting friends, and using Dropbox's camera upload feature on your phone.

    Dropbox offers desktop and mobile options for Mac, Windows, Android, iOS, BlackBerry, and Linux. The free apps can be found on Dropbox.com or in the respective app store. Once installed, Dropbox adds a folder where you can keep files in sync with the cloud (and your other devices). You can share specific files and folders with other Dropbox users as well. There's no size limit for file uploads, either. Dropbox also keeps a version history for every file stored with the service for 30 days.

    Box
    Box (formerly Box.net) offers free and paid accounts. Free accounts come with 5GB of storage. Sign into Box through one of the current promotional devices to receive a free upgrade of storage space -- up to 50GB. File uploads for the free account are limited to just 250MB, which increases to 1GB if you switch to a paid account. For $10 a month you get 25MB of storage, and $20 a month gets you 50GB of storage. Business and Enterprise accounts are available as well.


    Box offers desktop apps for Mac and Windows, along with mobile apps for iOS, Android, BlackBerry 10, and Windows Phone. You can sync and share specific files or entire folders with fellow Box users. Box also allows you to embed a file in your website, and place restrictions on who can print or download an embedded file. Version history is also included with the free account, making it easy to recover changed or deleted files.

    CUBBY

    Cubby is a storage service offered by LogMeIn. Free accounts start with 5GB of space, and you can earn up to 25GB of free storage. With each successful referral, 1GB of space will be added to the user's account. Paid accounts start at just $7 a month for 100GB of free storage. There are no file upload limitations.


    Free iOS, Android, Windows, and Mac apps are available to help keep your files in sync and provide access on the go. Unlike other services, Cubby allows you to "make any folder a Cubby," meaning you don't have to move files and folders around just to sync with the service. With a paid account, Cubby users get access to DirectSync. This feature allows you to sync unlimited amounts of data directly between computers, without counting it against your cloud storage allotment.


    SkyDrive
    SkyDrive is Microsoft's cloud storage service. It originally launched with 25GB of free storage, but new users get a more modest 7GB. There's no way to earn free storage. To increase your limit, you can subscribe for as little as $10 per year, upping your account by 20GB. Twenty-five dollars a year will get you 50GB, while $50/year gets you another 100GB. SkyDrive has Windows, Mac, iOS, Windows Phone, and Android apps available to keep your files in sync
    Perhaps the most intriguing feature for SkyDrive is the ability to create and edit Microsoft Office documents using the SkyDrive website. There's no need for Office to be installed on your computer; you can create and edit Word, Excel, PowerPoint and OneNote documents, then save them to your computer for free. You can then share the document with a public or private link, require the user to sign into SkyDrive before viewing and track who makes edits directly from the website.

    Lock up your digital valuables with Latch, the digital padlock


    Lock up your digital valuables with Latch, the digital padlock

    The Latch mobile app allows users to control and monitor access to a host of shopping, banking, email and social accounts
    Latch security app
    Latch can also be used by parents to control access to online services, while keeping the content of services such as email private
    A new app promises to allow web users to lock down access to shopping, banking, email and social accounts when they are not being used, much like a digital lock.
    The Latch app allows users to control access to online accounts with a variety of services, including banks and e-commerce sites, without of a username and password, adding an easy to use extra layer of security for peace of mind and to stop email and other accounts getting hacked.
    “It’s like a physical latch in the digital realm – with one app you can just put the latch on and off, reducing the availability of your online accounts when you’re not using them, therefore reducing their exposure to hackers,” explained Chema Alonso, chief executive of the Telefonica-owned Eleven Paths told the Guardian.

    Flick a switch to lock or open your accounts

    The premise is simple. When a user’s online accounts are not in use, they are locked down meaning that they cannot be logged into even with the right username and password combination.
    When the user wants to access their account they can simply flick a switch in the Latch app on their smartphone to instantly unblock them and allow the user to login with their normal username and password.
    Latch acts a digital lock for web services such as shopping, banking, email and social accounts
    The app connects with the Latch server, which in turn connects to the service the user wants to log in to, identifying that the lockdown should be removed and making the account freely accessible.
    The user can then lock down the account manually after they are done with it, automatically when they log out of it or after a set time, or have the latch opened only during certain hours, like a nine to five work day.
    If a user, or a third-party, attempts to log into a locked down account, the app will notify the owner, giving users an instant notification that someone is attempting to access their accounts and that they might have had their username and password stolen.

    Granular control

    For services that have a single sign-in but multiple applications such as email, calendar, cloud storage or an address book, Latch can be used to control access to all of them, or individual services.
    Parents can use Latch to control children’s access to services, but without allowing parents access to the content itself - leaving emails, for example, private.
    The Latch service has no access to username and passwords themselves – only a digital token that locks or unlocks accounts. This means that if Latch is hacked, the online accounts are still protected by the standard login details and if the user loses their smartphone, they can simply log in to Latch through another device.

    Available for almost everything

    The service is in pilot testing with various providers, including Telefonica’s own mobile phone service, as well as three universities in Spain. Eleven Paths has made it easy for online services to integrate Latch into their offerings, including open development kits and plugins for various platforms including blogging service WordPress.
    Despite being a Telefonica business, the Latch app is an independent and can be used by anyone on any network.
    The free Latch app was launched for iPhone and Android in December, but is now available for Windows Phone and FireFox OS, with a BlackBerry app in development.