Latest News: Microsoft Launches Webcam With 1080p HD Sensor
Microsoft’s Windows Live Messenger 2011, which is currently available in beta, supports HD video calling in 16:9 format, a feature that should go hand-in-hand with the company’s new webcam.
However, bear in mind that the video software that comes with the camera caps video chatting/recording at 720p.
LifeCam Studio will be available exclusively at Best Buy stores later this month for an estimated price of $99.95. It’s currently available for pre-order on the retailer’s website. Continue Reading...
Bookmark this post:
|
Nokia Launches Three New Symbian^3 Smartphones
N okia today announced three new Symbian^3 smartphones at its Nokia World event: Nokia E7, Nokia C7 and Nokia C6. These three share the OS with the upcoming Nokia N8, which (according to Nokia) is the only N-series device which will be based on Symbian^3.
The E7 is a device aimed at business users, with a full QWERTY keyboard, a 4-inch, 640×460 pixel touchscreen with Nokia’s ClearBlack technology for improved outdoor visibility and an 8-megapixel camera capable of recording 720p video. It touts 16GB of storage memory, and 350 MB of internal memory. In accordance with its business pedigree, the E7 can create PowerPoint slides on the go. It comes with a price tag of €495 ($638).
Nokia C6 has a 3.2-inch AMOLED screen (also with ClearBlack technology), while the C7 has a 3.5-inch AMOLED screen and a case consisting of stainless steel and glass. Both devices have an 8 megapixel camera with dual LED flash and the ability to record 720p video.
Nokia C6 has 340 MB of internal user memory, while Nokia C7 has up to 350 MB of internal memory and 8 GB of storage memory. The memory in both devices can be expanded with a 32 GB microSD memory card, and the price is €260 ($334) for the C6, and €335 ($430) for the C7. All three devices should become available before the end of 2010.
An Easy Way to Embed YouTube Playlists
If you are planning to embed multiple YouTube videos on a web page, you may even consider putting all these videos into a single YouTube playlist and then embed the playlist into your page. This offers two advantages:
1. You can squeeze in more video content in the same amount of (visual) space.
2. A video playlist will reduce the (byte) size of your web page considerably because, technically, you now have to embed the YouTube Flash video player only once on your page.
How to Embed YouTube Video Playlists
The default embed code for any YouTube video playlist looks something like this (remember to replace the word “ID” with the actual YouTube playlist ID) :YouTube offers an IFRAME option for embedding individual videos and the same code can be extended to embed video playlists as well.If you find the above code confusing, there a much simpler way as well.<object width="480" height="385">
<param name="movie" value="http://www.youtube.com/p/ID"></param>
<param name="allowFullScreen" value="true"></param>
<param name="allowscriptaccess" value="always"></param>
<embed src="http://www.youtube.com/p/ID" width="480" height="385"
type="application/x-shockwave-flash" allowscriptaccess="always"
allowfullscreen="true"></embed></object>
What’s the advantage? The code looks clean and, going forward, Google could make these playlists HTML5 ready. Then your existing video playlist will play on browsers that don’t have the Flash plugin without you having to change the embed code.You may have to modify the value of height and width attributes to make the video player fit your page.<iframe src="http://www.youtube.com/embed/p/ID"
width="100%" height="500" frameborder="0"></iframe>
A Guide to Choosing an Internet Based Fax Service
Although most people have switched to email, there are those rare occasions when you have to send signed documents with your written signature and a fax just seems like an appropriate solution then.
You don’t need a dedicated fax machine any more as there are quite a few good web based services, both paid and free, that let you send and receive faxes using your computer itself without requiring any extra hardware. You don’t need a “fax modem” or even your traditional landline phone to send a fax via the computer.
How Internet Faxing Works?
Most online fax services work in a similar way. They give you a dedicated fax number and any fax message that’s sent to that number is forwarded to you as an email attachment. Alternatively, if you want to send a fax from your computer to another fax machine, you can send your document as an email attachment to the online fax service who in turn will forward it to the recipient’s fax machine.
Choosing an Internet Fax Service
After researching the plans and features of about a dozen Internet based faxing services, I have shortlisted the top 5 services that have all the necessary features and are most cost-effective. They have plans for everyone from the consumer who needs to send or receive an occasional fax to the businessman who needs to send multiple faxes daily.
1. GotFreeFax.com – With Got Free Fax, you can send up to two faxes in a day for free to any number in the U.S. and Canada.
You can either use its online rich text editor to compose a fax or upload a PDF /Word file from your computer, type the recipient’s fax number and hit send. The service won’t add any advertisements or branding to your faxes. If you would like to send a fax to an international number, you can buy credits through PayPal.
2. myFax.com – My Fax allows you to send two faxes, with up to 10 pages each, per day for free. Unlike “Got Free Fax,” which only lets you send free faxes to US and Canada based numbers, My Fax supports a much large set of countries even for their free service.
MyFax offers a dedicated Fax number for an extra fee where you can receive faxes. All faxes sent to your personal fax number will arrive in your email inbox as PDFs.
3. GreenFax.com – With Green Fax you can again send and receive faxes via email. They offer a unique prepaid plan where you are only charged per page for sending faxes to US and Canada numbers without any monthly fees.
If you are sending a fax to an international number, you are billed per-minute of fax transmission time and unsuccessful transmissions are not charged.
4. eFax.com – If you need a fax number outside the USA, eFax is probably the best option for you. They offer your local fax numbers in 45 different countries for your incoming faxes. For a fixed monthly fee, you may receive up to 130 pages by fax per month while you pay a per page fee for sending faxes and this varies based on the destination.
With eFax, you may either send and receive faxes via your email program or they also offer integration with Microsoft Office programs.
5. RingCentral Fax – With RingCentral, you can send faxes worldwide through an email message, via their web interface, or from any Windows application. They charge a fixed monthly fee and their outgoing fee seems to be among the lowest in the industry.
Internet Fax Services – Plan Comparison Chart
The following chart compares in detail the pricing plans of various online fax services and also the cost of sending faxes to some popular destinations.
These rates often apply to fax pages that take less than 60 seconds to transmit. If the fax transmission is taking longer than 60 seconds, some companies may bill you on a per-minute basis instead of per page.
[*] FaxPipe and MaxEmail are two other Internet based fax services that let you send and receive faxes and they have an overall lower monthly fee but it has be paid annually.
Which is the best Internet Faxing Service for me?
It depends on your country of residence, the volume of documents that you plan to fax in a month and the location of your client (if you wish to receive incoming faxes).
For most consumers, who have to send a fax occasionally , GotFreeFax looks like a perfect service. They do not charge a monthly fee, the rates for international outgoing faxes are competitive and you can send a fax from the browser without requiring any setup.
If your clients /contacts are based outside the U.S., you can go with eFax as they will give you a local fax number in that country and your clients won’t have to dial an international number in order to send you a fax. RingCentral and myFax also offer attractive pricing plans for volume faxing.
HTC EVO 4G Problems: What Users Complain about the Most
From screen separation to USB charging issues, here are the EVO 4G pitfalls users complain about most.
Poor battery life
Sure, your shiny new EVO 4G will function as a Wi-Fi hotspot, sharing out your 4G signal to up to eight friends, but you had better find an outlet if you want to keep them happy. Although the EVO 4G has roughly the same battery capacity as most other smartphones, heavy 4G use can quickly whittle it down within just hours. It’s not a manufacturing error: Just an unfortunate consequence of pumping data way faster than your 3G peers.USB charging issues
A small number of EVO 4G buyers report they have had issues charging their phones via the microUSB port. Some claim their phones will not charge at all, while others experience intermittent charging. The problem appears to be due to the female microUSB port working its way loose from the motherboard. HTC is aware of the problem and will exchange phones within the standard one-year warranty period.Light leakage and glass separation
The 4.3-inch display on the EVO 4G, gorgeous as it is, has had some issues. Early adopters complained that the screens on some phones are not properly sealed, leading to light from the backlight bleeding out, and potentially in the long term, dust build up. HTC claims it has remedied issues at the factory that caused the problem.Unresponsive touch screens
The EVO 4G uses the same capacitive technology found on devices like the iPhone and Droid, but some users complain the device can become unresponsive when it isn’t grounded (being held in the hand). Check out the demo video below.Continue Reading...
Bookmark this post:
|
Iomega eGo USB 3.0 Review
Introduction
Features and Design
Testing and Performance
Conclusion
Iomega’s eGo USB 3.0 portable drive maintains the same winning look and feel as previous iterations while essentially doubling transfer speeds. The 500GB version of the drive still commands a $20 price premium over the (list price) USB 2.0 version, but the USB 3.0 version will be a no brainer when Iomega switches the rest of the eGo line to USB 3.0, without increasing price, in October.Highs:
- Vastly improved transfer speeds
- Sleek, portable design
- Affordable (more so after October price drop)
- Backward compatible with microUSB cables
Lows:
- Not the speediest competitor in USB 2.0 mode
Bookmark this post:
|
4 Tips for Writing SEO-Friendly Blog Posts
In addition to writing for their human readers, web writers and bloggers have to consider the digital web crawlers employed by search engines like Google Your business can’t skip the task.
Since most would-be readers use search engines to find blog posts, you need to make sure that Google ranks your site highly when those readers search for terms related to your business and the content you’re writing.
You could spend thousands of dollars to have a search marketing firm optimize your business’s blog for search engines, but chances are that you can learn a lot of the fundamentals yourself, saving yourself a lot of money as long as you have the interest and the time. Here’s a basic primer on Search Engine Optimization (SEO) for your company’s blog.
1. Always Include Search Terms in Your Post’s Title
When Google reads a website to index it, it reads the code directly, not the snazzy presentation that humans see. The way most blogging platforms are built, the headline or title of your blog post is among the first things Google sees, and Google generally assumes the words that appear earliest are the most important. That’s why the title is the most important part of your blog post when it comes to SEO.
Think about who you want to reach with this blog post, and what that person might be searching for when looking for your business’s goods or services, then include critical words from that hypothetical search in the title. The most important terms should appear as quickly as you can reasonably fit them in. Just be careful not to make the title unreadable or awkward to human readers — that SEO effort will have been for naught if the reader is immediately turned off by the content once he or she finds it.
Here’s a pro tip: You’re not likely to win strong ranking for more than one or two search terms at once, so minimalism is a virtue here. Don’t get over-ambitious. Focus on one potential search term, then if you want to rank for a second term, write a separate and unique post specifically with it in mind.
2. Link Important Words to Earlier Blog Posts
Search engines generally assume that a blog post that has been linked to has more authority than one that has not. They also consider exactly what word or phrase linked to the post; a blog post about the iPhone is going to be more likely to show up in Google searches on the subject if another page links the word “iPhone” to the post.
You’ll get the most value from external links from sites that Google or other search engines already consider to be an authority of the subject (if the top blog about iPhones links the word to your post, you’ll get a huge boost), but all incoming links will still pass rank to your page, even those from elsewhere on your site.
So be sure and link important keywords to other pages or previous posts on your blog to gain some credibility and search rank. It will make a big difference. Just don’t overdo it; not only do human readers hate reading blogs so filled with links that they might accidentally click on something, Google may penalize you if you go overboard, too.
3. Hit the Tagging Sweet Spot
Most blogging platforms let you apply tags to your posts. Tags help organize your blog so both humans and search engines can find what they’re looking for. They’re terms like “consulting,” “local” or “technology” that reflect the topics and content of the post.
Google tries to recognize tags and use them to prioritize your site in its search ranking for those terms. The tags are usually links to other pages on your blog (usually a backlog of other posts with the same tag), and like we said earlier, linking search terms to other pages on your site helps too.
So by all means, add pertinent tags to your blog post, but be warned that Google and other search engines are wary of sites that try to game this system. They will penalize you in the search rankings if you use so many tags that the web indexing bots suspect you might be attempting to associate your content with unrelated topics just to score extra traffic.
The method for determining this is arcane, but a good rule of thumb from a pro blogger is that five to 10 appropriate tags are usually right in the sweet spot.
4. Use Google Insights to Find the Best Search Terms
Bookmark this post:
|
How to Make your Windows Start-up Faster
Does your Windows computer take really long to start-up?
Well, you are not alone with this problem but fortunately, with some minor tweaks, you can get your sluggish Windows to start much faster without re-installing Windows or adding any new hardware.
The logic is fairly simple. Your computer loads quite a few software programs and services during start-up (look at all the icons in your Windows System tray). If you can trim this list, your computer’s boot time will decrease.
I have been testing a free utility called Soluto and it helped reduce the start-up time of my Windows computer from 3.15 minutes to around 1.25 minutes. All this with a few easy clicks and without confusing the user with any technical jargon.
After you install Soluto, it sorts your start-up programs list into three categories:
- No-brainer – remove these programs from start-up with giving a second thought.
- Potentially removable – another list of start-up programs that may also be removed provided you know what these programs do.
- Required – Certain programs and services are required to run Windows properly and therefore should not be removed.
You can also hover the mouse over any program name and Soluto will display the number of seconds that the app adds to the start-up time. And don’t bother about making mistakes because Soluto has a useful “Undo all” feature that will restore the start-up list to the original state with a click.
Once you are done classifying your start-up programs list, reboot the computer and you should notice a difference between the start-up time.
Where to download Soluto?
The official site for Soluto is soluto.com but in order to download the program, you should head over to mysoluto.com.
Alternatives to Soluto
If you are tech-savvy, you can also use a utility like Sysinternals Autoruns to manually prevent all the non-essential Windows processes and programs from running at start-up.
Just uncheck all the Autorun entries and Services that you don’t wish to load at startup and reboot your system. You’ll however need a separate program to get the “delay” feature which is so handy in Solute.
Continue Reading...
Who Broke the News (or the Embargo) First?
Let’s say a company is about to launch a new product and, as is the standard practice, they have pre-briefed a select group of media outlets and bloggers about the news under an embargo.
The launch date is close and writers have already prepared their news stories so that they can push them as soon as embargo is lifted. And then something strange happens – one media outlet publishes the story ahead of time thus breaking the embargo – intentionally or unintentionally.
Find Who Broke the News Embargo?
Broken embargoes can be frustrating for journalists and bloggers as the limelight (and page views) often shifts to the news publication who did not honor the embargo.If a news embargo gets broken, here’s a simple way that may help you determine the name of the publication that broke it in the first place.
Step 1. Go to google.com/realtime and type a few words from the story headline.
Step 2. In the timeline, click an area where you have minimal number of tweets around that story. That’s when the news first broke on the Internet and looking at the tweets, you should be able to figure who broke that news.
To give you an example, Google pre-briefed a number of publication about the priority inbox feature of Gmail and the news was supposed to stay under embargo until 9 AM. eWeek however published the story at 8:36 AM while others still had their story in the queue.
This technique works because most sites now auto-syndicate their content to social sites like Twitter and Facebook. Since all the stories are getting on Twitter, you can easily sort them by publication time through the timeline of Google Real Time search. Continue Reading...
Bookmark this post:
|
Poster Compares the Samsung Galaxy S Phones
The Samsung Galaxy S series of Android mobile phones have been a huge success in the U.S. as well as various international markets.
Compare Samsung Galaxy S Phones
The Galaxy S phones are available though all major carriers in the U.S. though with a slightly different set of features and under different names – you get them as Epic 4G on Sprint, Samsung Vibrant on T-Mobile, Samsung Fascinate on Verizon and Captivate on AT&T.If you are based in the U.S. and are planning to go for a Galaxy S, the following poster from BillShrink should help you narrow down your choices.
The poster compares the common features and technical specifications of the various Galaxy S phones as well as the contract plans.
Samsung Galaxy S – What’s Common
Samsung Galaxy S – What’s Different
Continue Reading...
Bookmark this post:
|
How to Check the Health of your Hard Drive
Hard disk failure is possibly the worst thing that can happen to your computer and it often occurs without giving any warning signs.
Test Your Hard Drive for Impending Problems
You may however run certain tests on your computer beforehand to get an idea about the current condition of your hard disk. This should in turn help you decide whether a replacement drive is necessary or not.Step 1: Check your hard disk for errors
All recent versions of Windows include a utility called Chkdsk.exe that can check your hard disk for any bad sectors.You may either run Chkdsk from the command line (see details) or launch Windows Explorer, right click the drive that you wish to examine and choose Properties. Switch to the Tools tab and click the “Check Now” button under Error checking. Select “Scan for and attempt recovery of bad sectors” to perform a thorough disk check.
Step 2: Understand the sounds of your disk
Do you sometimes hear strange sounds coming out of the CPU box? Well, if the hard drive is making those sounds, it could be an alarming situation and your best bet would be that you turn off the computer before any further damage is done to the disk.But how do you distinguish between sounds coming from a hard disk with noise that’s made by the fans or the power supply? Here’s a useful page where you can listen to recorded sounds of various hard drives that have lead to a crash. If your disk is making a similar sound, get a replacement quickly.
Step 3: Catch errors before they happen
Disk Checkup is a free hard disk monitoring utility that displays tons of diagnostic data about your disk. While the level of detail it provides may easily confuse even tech-savvy users, just ignore the numbers and keep the utility running in the background.It monitors your disk’s temperature, read and write error rate, etc. and will alert you when the values of any of these parameters approach dangerous levels. These may be signs of an impending disk failure. Disk Checkup is free for personal use.
Step 4: Thoroughly test your Hard Disk
SeaTools is free diagnostic tool that can completely test your hard drive regardless of the OS installed on it. The tool is provided by Seagate but it works with non-Seagate disk drives as well.To get started, you need to download the ISO image of SeaTools for DOS and create a bootable CD. Now boot the computer with the CD in the drive, accept the license agreement and run a long test (the full scan). If any defects are found, a list will be offered at the end or after aborting the disk scan.
Other computer vendors /disk manufactures including Samsung, Hitachi, Toshiba (Fujitsu), Western Digital, Lenovo, Dell, etc. too offer diagnostic tools that work only with their own brand of hard drives. If you are having frequent computer problems (like system hangs or fails to boot up), you may run these tools to confirm if the problems are hard drive related. Continue Reading...
The Debug Log Stores your BlackBerry Call History
This may surprise some BlackBerry users.
Do you know that your BlackBerry has a log file where it keeps a detailed record of every single action that you perform on the device including your incoming and outgoing phone calls?
To view the log file of your own BlackBerry, go to the home screen, hold the ALT key and press LGLG. If you are using a BlackBerry Storm, display the keyboard in portrait view, hold the number key for while to lock the number keyboard and then type ,5,5 to display the phone log.
Your BlackBerry Call History is in the Debug Logs
These debug logs may sometimes help you troubleshoot issues with your BlackBerry but there’s one related issue that you should be aware of.Even if you remove the SIM card from your BlackBerry and manually clear all the phone call logs, one can easily read your dialed and incoming phone numbers list from the debug log.
This won’t be an issue for most BlackBerry users but if you ever plan to giveaway or sell your old phone, remember to clear the debug logs manually as well. Unfortunately, BlackBerry doesn’t offer a way for you to turn off logging permanently. Continue Reading...
Bookmark this post:
|
Top 10 Most Important Features for Enterprise Smartphone Management Solutions
Challenges for the enterprise
According to Forrester, IT is struggling with a two-fold challenge: mobile device management and security. To solve this problem, enterprises are increasingly investing in device-agnostic solutions. In the firm's report on mobile application development, Forrester recommends creating Web applications, instead of native applications, whenever possible.Key Functionality for Smartphone Management Solutions
Forrester identified ten key pieces of functionality for smart phone solutions. The first seven are key features that have standardized across most device management solutions:
- Configuration management
- Security management
- Central console
- Over-the-air (OTA) intelligence, troubleshooting, and support
- Asset management and reporting
- Software management
- Scalability
- Remote control
- Device recovery
- Self-service portals
Of the 26 solutions Forrester evaluated, the following ten include all ten key pieces of functionality:
However, many other solutions contain important and useful solutions, so enterprises should consider other possibilities. For example, Motorola's MSP solution can also manage peripheral devices such as cash registers, scanners, RFID readers, printers, signature capture pads, and kiosks, and SOTI's MobiControl supports location-based asset tracking features.
What the Future Holds for Smart Phones in the Enterprise
Forrester makes the following three predictions for the near future:- Support for BlackBerry, iOS, and Android will be a top priority for IT managers
- Vendor consolidation will continue
- True convergence of smartphone and PC management is inevitable but still years away
Bookmark this post:
|
History of the Internet – Timeline
The Internet was created in the United States by the "United States Department of Defense Advanced Research Projects Agency" (known as ARPA). It was then known as ARPANET and went online in 1969. The World Wide Web was created at CERN in Switzerland in 1989 by Tim Berners-Lee. See the Internet Timeline.
Bookmark this post:
|
سنا ہے لوگ اسے آنکھ بھر کے دیکھتے ہیں
سنا ہے لوگ اسے آنکھ بھر کے دیکھتے ہیں
تو اس کے شہر میںکچھ دن ٹھہر کے دیکھتےہیں
سنا ہے ربط ہے اس کو خراب حالوں سے
سو اپنے آپ کو برباد کرکے دیکھتے ہیں
سنا ہے درد کی گاہک ہے چشمِ ناز اس کی
سو ہم بھی اس کی گلی سے گزر کے دیکھتے ہیں
سنا ہے اس کو بھی ہے شعر و شاعری سے شغف
تو ہم بھی معجزے اپنے ہنر کے دیکھتے ہیں
سنا ہے بولےتو باتوں سے پھول جھڑتے ہیں
یہ بات ہے تو چلو بات کر کے دیکھتے ہیں
سنا ہے رات اسے چاند تکتا رہتا ہے
ستارے بام فلک سے اتر کے دیکھتے ہیں
سنا ہے دن کو اسے تتلیاں ستاتی ہیں
سنا ہے رات کو جگنو ٹھہر کے دیکھتےہیں
سنا ہے حشر ہیںاس کی غزال سی آنکھیں
سنا ہے اس کو ہرن دشت بھر کے دیکھتے ہیں
سنا ہے رات سے بڑھ کر ہیںکاکلیں اس کی
سنا ہے شام کو سائے گزر کے دیکھتے ہیں
سنا ہے اس کی سیاہ چشمگی قیامت ہے
سو اس کو سرمہ فروش آہ بھر کے دیکھتے ہیں
سنا ہےجب سے ہمائل ہے اس کی گردن میں
مزاج اور ہی لعل و گوہر کے دیکھتے ہیں
سنا ہے اس کے بدن کی تراش ایسی ہے
کہ پھول اپنی قبائیں کتر کے دیکھتے ہیں
سنا ہے اس کے لبوں سے گلاب جلتے ہیں
سو ہم بہار پہ الزام دھر کےدیکھتے ہیں
سنا ہے آئینہ تمثال ہے جبیں اس کی
جو سادہ دل ہیںاسے بن سنور کے دیکھتے ہیں
بس اک نگاہ سے لٹتا ہے قافلہ دل کا
سو راہ روانِ تمنا بھی ڈر کے دیکھتے ہیں
سنا ہے چشمِ تصور سے دشتِ امکاں میں
پلنگ زاویے اس کی کمر کےدیکھتے ہیں
وہ سرو قد ہے مگر بے گل مراد نہیں
کہ اس شجر پہ شگوفے ثمر کے دیکھتے ہیں
سنا ہے اس کے شبستاں سے متصل ہے بہشت
مکیں ادھر کے بھی جلوے اِدھر کے دیکھتے ہیں
کسے نصیب کے بے پیرہن اسے دیکھے
کبھی کبھی درودیوار گھر کے دیکھتے ہیں
رکے تو گردشیں اس کا طواف کرتی ہیں
چلے تو اس کو زمانے ٹھہر کے دیکھتے ہیں
کہانیاں ہی سہی ، سب مبالغے ہی سہی
اگر وہ خواب ہے تعبیر کرکے دیکھتے ہیں
اب اس کے شہر میںٹھہریں کہ کوچ کر جائیں
فراز آؤ ستارے سفر کے دیکھتے ہیں
Dell Launches $100 Smartphone In US On AT&T
Dell has launched its first smartphone in the US, the Android-based Dell Aero, for $299.99 without a contract or $99.99 with a two-year AT&T contract.
Bookmark this post:
|
Free iPad Scam Hits Facebook and Twitter [WARNING]
The scam is also present on Facebook but it has affected a relatively small number of users.
The message “offering” the free iPad is similar to this one: “u have to check out this website its glitchin right now and sending out ipads to everyone for free!”
The messages usually contains a link, sending you to a website that tries to extract personal information from unsuspecting users. If messages similar to the one above have been sent from your account, you should change the password immediately. Furthermore, you should not follow the link in such messages, and you should not give away your personal information if you’re not absolutely sure why and who you’re giving it to.
Bookmark this post:
|
The Best OCR Tools for Converting Images to Text
OCR software let you easily convert images, such as digital photographs, scanned documents, printed books, etc. into text. Once you perform OCR on an image, you’ll be able to copy-paste or edit the text content of that image without any retyping and it also becomes more searchable.
The Best Web-based OCR Services
Most scanners ship with some sort of OCR software but if you don’t have a scanner, you can simply capture a photograph of the printed text with your digital camera or even your mobile phone and then use an online OCR utility to extract text out of that image.Meet the best online OCR services that can help you convert images into text.
1. Google Docs – When you upload an image file or a scanned PDF to Google Docs, check the option that says “Convert text to Google Docs format” and Google Docs will automatically perform OCR on the file before saving it to your account.
If the OCR operation is successful, all the extracted text is stored as a new document else Google Docs will store your original image without any modification.
With Google Docs, you can perform OCR on images and PDFs as large as 2 MB, the text recognition accuracy is quite impressive and there are no limits on the number of files that you can process in a day. However, Google Docs won’t retain the original formatting of the document and the OCR engine almost fails with low-resolution images.
2. Abbyy FineReader – FineReader Online is a web-based OCR service that can instantly convert your PDF files and images into corresponding office file formats. This is an Abbyy service and therefore the character recognition accuracy is quite good.
Unlike the OCR engine in Google Docs that can only recognize printed text written Latin characters, FineReader can understand a much wider variety of languages. It even works with multilingual documents that have text written multiple languages.
A free account at FineReader Online will only let you convert a handful of images to text and you’ll have to shell out around $3 per 10 pages for additional conversions.
3. OnlineOCR.net – Online OCR, as the name suggests, is a cloud based OCR service that can handle all common images formats including scanned PDFs. If you have multiple images that you would like to convert to text in one go, you can put them all in a single zip file and upload it to Online OCR.
Of all the OCR services that I have tried so far, Online OCR has impressed me the most. The character recognition accuracy is quite good and the converted documents look like a replica of the original images. In my limited test with three different types of images, Online OCR was able to preserve the structure and formatting after the conversion in all the three case.
Like FineReader, Online OCR offers credits for converting around 5-6 images to text for free and after the limit is over, you’ll have to pay around $4 per 50 pages.
4. FreeOCR.com – If you ever need to extract plain text from an image or a scanned PDF file, Free OCR may be worth a try. The service requires no registration and you can handle up to 10 image uploads per hour.
Free OCR is like a graphical front-end for Google’s Tesseract OCR engine that is often considered as one of the most accurate text recognition engines around. However, Tesseract supports only a limited number of languages and it ignores most of the formatting of the scanned image.
5. OCR Terminal – OCR Terminal is one of the most mature online OCR services out there that not only supports images and scanned PDFs but even software screenshots.
For instance, if you ever get an error message on your computer, capture a screenshot, upload the image to OCR terminal and it will return you the entire error in plain text that you can copy-paste in emails or online forums.
OCR Terminal is internally powered by Abbyy’s OCR engine. A free account with OCR Terminal gets you 20 free conversions every month and you can pay around 7-9 ¢ per additional conversion.
6. OCR Online – Like FreeOCR, OCR Online doesn’t require any registration and you can translate up to 100 images to text in a single day. It also supports a large number of languages.
OCR Online offers good recognition accuracy and preserves most of the original formatting but what you’ll like most about this service is batch processing. You can upload a large number of files in one batch and it will output the results as one document.
Online OCR Software – A Comparison
[*] One obvious downside will all the above mentioned OCR software is that they work only with printed text, they cannot recognize characters from hand-written text. Continue Reading...
Bookmark this post:
|
Flying along: Japanese artist opens up the seas with a boat shaped like a giant zip
When Moses thought of parting the sea you can bet he never thought of using a zip.
Japanese artist Yasuhiro Suzuki though has created a motorboat designed to look like a giant version of the fastening, with the wake it leaves behind in the water meant to represent its teeth.
Suzuki made a scale model of his design back in 2004 but has only now unveiled the full-sized vessel.
'As the vessel glides through the water, the wake looks like a zipper coming undone, suggesting the image of the sea opening up.
'The Zipper Ship will travel to and fro between Takamatsu and Megijima [in Japan] and will also carry passengers.'
Suzuki first showed off his unique vessel at the recent Setouchi International Art Festival in Japan.
Suzuki has won several awards, including the
Interactive art prize at the Digital Stadium Awards in 2001, since graduating as a designer from Tokyo Zokei University.
His other works include Perspective of the Globe Jungle, created in 2001, and Property of Water in 2004.
Watch video of the giant zip boat in action:
Continue Reading...
Hackers see the cloud as ripe territory
Is the cloud a hacker's paradise? A survey at last month's DefCon hacking conference paints that picture.
"More than anything, this research confirms our ongoing observations that cloud vendors--as well as the IT software industry as a whole--need to redouble their governance and security assurance strategies when developing solutions, whether cloud-based or not, as all IT systems will eventually have to support a cloud resource," Fortify chief products officer Barmak Meftah said in a statement. Continue Reading...
HOW TO: Undo “Send” in Gmail
The feature is hidden from most users who don’t know where to look, so here’s a quick guide to avoiding social and workplace faux pas with the click of a button. Be aware that the feature is part of Gmail Labs, though. That means it’s still in testing and it might not always work as intended.
Go to Gmail Labs
Enable “Undo Send” and Save Your Changes
Customize Undo Send’s Duration
Write and Send Your E-mail
Click the “Undo” Button After You Send
“Sending Has Been Undone”
Cameron Diaz Is The Most Dangerous Celebrity to Search For Online
And this year, Timberlake’s former flame Cameron Diaz took the top spot on Internet security firm McAfee’s annual list of the most dangerous stars to search for on the Web.
Look up one of these people and you almost invite computer viruses and worms to invade your computer.
“It’s sort of a little bit of rivalry from the traditional world going to the cyber world,” said Dmitri Alperovitch, McAfee’s vice president of threat research. “It’s fascinating how cyber criminals can be so in tune with the popularity of various actresses and models. …They’re actually a fantastic barometer of their popularity.”
Every year, McAfee compiles the rankings using its free software SiteAdvisor, which alerts users to a website’s riskiness before they click on it.
Its 2010 study, which McAfee released today, found that users have a 19 percent chance of landing on a malicious site when they search the Web for “Cameron Diaz.”
Searching for pictures and downloads of the actress gives you a 10 percent chance of reaching a site infected with spyware, adware, spam, phishing, viruses and other cyber traps that can harm your computer or steal personal information.
Celebrity Searches Safer This Year, McAfee Said. Alperovitch said that even though celebrity searches were safer overall this year, searching for Diaz is even riskier than searching for Biel.
“She’s been in the spotlight recently with a number of blockbuster movies, “Knight and Day,” of course, with Tom Cruise,” he said. “What we see is that we people who are in the news recently… they tend to be at the top of the list because they’re on peoples’ minds. People tend to go on Google and Bing and search for them after they’ve watched their movies. Cyber criminals realize that very well and target people when they do this.”
To keep your celebrity searches safe, Alperovitch recommended making sure your computer is running an up-to-date antivirus program. McAfee sells them — incentive for them to publish today’s list — but so do competitors. Norton, AVG, Kaspersky and F-Secure are some of the most popular makers of security software.
“If you’re searching for screen savers, downloads or ringtones, which are affiliated with very risky behavior, it almost inevitably will lead you to an infected site,” he said. “News and information tend to be a lot safer.”
Here’s the full 2010 list of McAfee’s ‘Most Dangerous Celebrities’:
- Cameron Diaz – Searching for Diaz results in a one in ten chance of landing on a risky site. She has most recently been in the spotlight with blockbuster movies, “Knight and Day” and “Shrek Forever After.” When “Cameron Diaz and screensavers” was searched, 19 percent of the sites were identified as containing malicious downloads.
- Julia Roberts – Academy Award-winning actress Julia Roberts is one of America’s sweethearts, and will soon be in the spotlight with her upcoming release of “Eat, Pray, Love.” The overall risk of searching for Roberts is nine percent, yet searching for “Julia Roberts and downloads” results in a 20 percent chance of downloading a photo, wallpaper or other file laden with malware.
- Jessica Biel – Last year’s Most Dangerous Celebrity fell two spots with searches resulting in fewer risky sites this year. Biel continues to be in the spotlight with her on-again, off-again relationship with Justin Timberlake, and appeared in “The A-Team” in June 2010. While her overall search risk is nine percent, searching for “Jessica Biel and screensavers” results in a 17 percent chance of landing on a risky site.
- Gisele Bündchen – The world’s highest-paid supermodel moved up two spots since last year. Searching for “Gisele Bündchen and screensavers” can prove risky, 15 percent of the search results for this beauty can put spyware, malware or viruses on your computer.
- Brad Pitt – Pitt is often in the spotlight with news of his movies and his personal life. It’s no wonder why this leading man has been in the top ten for the past three years. He moved up in rank five spots this year. Downloading photos, screensavers, or other files of Brad can potentially put adware or spyware in your computer.
- Adriana Lima – Searching for downloads of this Brazilian beauty can direct users to red-ranked sites. Lima is best known for being a Victoria’s Secret Angel since 2000.
- Jennifer Love Hewitt, Nicole Kidman – Searching for these Hollywood starlets resulted in an equal number of risky download websites.
- Tom Cruise – With recent buzz around his MTV Awards performance as well as his movie, “Knight and Day,” Cruise rises to the top ten.
- Heidi Klum, Penelope Cruz – Both of these ladies are consistently in the spotlight, and share the #9 spot. Cybercriminals use their names to lure people to risky sites. Klum hosts “Project Runway” and Cruz has been in the spotlight recently for her role in the “Sex and the City 2” movie and is expected to be in the fourth film of the “Pirates of the Caribbean” series.
- Anna Paquin – This “True Blood” star is as dangerous on the Web as she is on the screen. Searching for screensavers of Paquin can lead you to downloads filled with malware.
Teen superstar Justin Bieber ranked toward the bottom of the list at No. 46. Barack Obama and Sarah Palin brought up the rear at 49 and 50. Continue Reading...
HOW TO: Make Your Mobile Websites Act More Like Native Apps
Native applications still have their place, but increasingly, the number of different device types, operating systems, and screen sizes make developing optimized mobile web apps more and more enticing. Historically, there has been a trade-off between the rapid, iterative, cross-platform nature of web applications versus the more standard UI, support for gestures, and multi-touch and hardware optimizations on the native side.
Fortunately, a number of different frameworks are making it easier and easier for developers to create mobile web applications that look and feel more like native apps. Here are six examples. If you don’t see your favorites on the list, add them in the comments below.
1. Sencha Touch
2. SproutCore
3. YUI 3.2
5. XUI
6. iUI
Bookmark this post:
|