Portable Devices

Consumer 2.0 – The Lifestyle of Carrying Branded Devices
Mobile Computing

Consumer 2.0 – The Lifestyle of Carrying Branded Devices

Computing technology are currently undergoing evolution. Competition were no longer about the speed. Consumers also have a new benchmark and very different. They transformed into a new consumers generation that I described as Consumer 2.0. What are the characteristic of the consumer 2.0? The main characteristic of Consumers 2.0 are their computing devices that more personal. The concept of sharing one computer at their home already left off. Each family…
Lixil Statis, Smart Toilet Made in Japan Can Controlled by Smartphone
Personal Technology

Lixil Statis, Smart Toilet Made in Japan Can Controlled by Smartphone

Bathroom in Japan will be a little more interactive, thanks to the toilet which can be controlled with a smartphone called The Satis. Produced by a company based in Tokyo, Lixil, Bluetooth-equipped toilets can be controlled with an Android app called “My Statis”, which allows users for watering, raising toilet seat and activate bidet jet stream (that you normally use for wiping) by touching one button. This application also allows…
Raidon Staray 5 Series Performance Review, Password Protected and Fingerprints
Hardware Reviews

Raidon Staray 5 Series Performance Review, Password Protected and Fingerprints

Generally, portable storage devices can be secured with a password to prevent Data migration in it into unauthorized hands. Well, this time Raidon Technology products (storage device manufacturers from Taiwan), a device that is more secure than other general devices. Because, in addition comes with password, this device also comes with a fingerprint systems. In essence, the storage devices will be divided into two areas: protected areas (X-Zone) and the…
Folder Lock Performance Review, Lock the files/folders and portable devices
Data Recovery

Folder Lock Performance Review, Lock the files/folders and portable devices

Folder Lock can be used to lock a file/folder using AES 256-bit encryption. The method is capable of processing data protection in a short time, although the locked data are large. Folder Lock can not only be used on the data contained on your hard disk, but also on other storage media such as external hard disks, flash, and a compact disc (CD/DVD). To run the Folder Lock, the first…
Back to top button