BluePad is free software, which turns our cell phone into a remote bluetooth controller with which we can control our computer. It is composed by two programs, one to install in our computer, and another for our mobile device. With BluePad, we can control presentations as if we had a remote controller, play our music or movies remotely and play games using our cellphone as a game pad.
>>Watch the BluePad Demo video:
Best4c [Best for chart] is a Web-based, online diagram tool that allows us to create, edit and share charts anytime, anywhere on the web. With it we can create many types of diagrams such as Flowcharts, Floor plans, Network diagrams, or any other simple drawing or diagram. It provide an interactive drawing and diagramming solution within all popular internet browsers like FireFox,IE,Opera,Safari.
>> demo
A Neuroscientist working in Britain has found a way to induce an out-of-body experience, a technique that makes people feel as if they are standing behind themselves, watching their own backs. Using goggles hooked up to video cameras, and sticks to poke and stroke, researchers subjected study participants to a variety of visual and physical cues to confuse their brain about their body's location.
>>
The 3D Doodle Drawing compass instrument allows us to draw images to be in duplicate red and blue lines which are in small but constant distance apart. This has the effect of lifting the design off the page and giving it depth when viewed through the special 3D glasses provided.
>>
Gmail+Growl makes Google Notifier show Growl notification bubbles whenever new email arrives in your Gmail inbox. While google notifier shows its own pop-up and doesn't sends out those notifications, but Gmail+Growl helps Google Notifier send Growl notifications instead. Unlike Google Notifier's own notification popup, Growl notifications can look the way you want them to by downloading some Growl displays [or by writing your own in standard HTML].
>>
Yahoo Inc may be struggling to convince Wall Street of its future prospects, but for the first time its users gave its services overall a better rating than what Google Inc received, according to a study. Data from the University of Michigan American Consumer Satisfaction Index showed Yahoo had seen its customer satisfaction score rise 3.9 percent from a year ago to 79 out of 100 points, while Google's rating fell about 3.7 percent to 78 points. While Google remains the dominant Web search engine, Yahoo's Internet presence is gaining user approval for its network of Web sites, e-mail, social networks and other features.
>>
At the Black Hat security convention, Robert Graham, the CEO of errata security, surprised attendees by hijacking a Gmail session on camera and reading the victim’s email. Taking over another person's Gmail account and then sending us sheep-loving emails. The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser in easy point-and-click fashion with a home-grown tool called Hamster.
>>
Google CEO Eric Schmidt at the Seoul Digital Forum, explains that Web 2.0 was based on Ajax, Web 3.0 will be "applications that are pieced together" with the characteristics that the applications are relatively small, the data is in the cloud, the applications can run on any device like PC or mobile, the applications are very fast and very customizable, and are distributed virally by social networks, email, etc. Checkout the video of his explanation.
>>
FreeTechBooks.com lists free online computer science, engineering and programming books, textbooks and lecture notes, all of which are legally and freely available over the Internet. All the books listed in this site are hosted on websites that belong to the authors or the publishers. We are allowed to view, download and with a very few exceptions, print the books for our own private use at no charge.
>>

As spammers get better at defeating text-based Human Interactive Proofs [HIPs], the next step in anti-spam technology may rely on photos of kittens and other images that are easy for humans to identify, but difficult for machines. An executive at Microsoft has an unusual idea for beating spammers. Powerful software tools and supercomputers aren't involved, but kittens are or rather, photos of kittens. Kevin Larson, a researcher at Microsoft's advanced reading technologies group, has found that asking a user to identify the subject of a photo, like a kitten, could help block spam programs. One twist on the HIP idea that they've worked on is to display 16 or more photos and ask for identification of the photos. In an example, he suggested using pictures of cats and dogs. The problem with the concept, however, is that Microsoft would have to create a massive catalog of photos, otherwise the programmers could match the correct response with each photo in the catalog and begin to spoof the system.
>>
Catapult Watch, the only watch that's also a weapon ;) it shoots dried peas, popcorn kernels, lentils and more up to 8 feet accross the room! This stainless steel watch will be the envy of the classroom or the meeting room. Use it to "wake-up" those sleepy headed co-workers and classmates. When they look around to see who's been pelting them with spitballs, you'll just be casually checking the time.
>>
Songbird is a desktop Web player, a digital jukebox and Web browser mash-up. It is built on Mozilla, cross-platform. We can play anything MP3, AAC, OGG, FLAC, WMA, and search the web from the context of our collection or tell Songbird to search on the currently playing track. It also allows us to create our own custom mixes and play web pages as playlists and view any web page as a playlist. Songbird makes the web and music so fun!
>>
Last week, researchers from a security company found a flaw in iPhone software that allows it to be remotely controlled. The weak spot was in the Safari Web browser, software that's also used on Apple's computers. It's a good example of how flaws in PC software show up in a similar guise on cell phones. Cell-phone viruses have been around for nearly a decade, but many experts believe that serious threats could become a serious problem in the next couple of years. Cell phones have their own set of problems. For instance, mobile devices are easily lost or stolen; they are accessible via a number of methods, including the cellular network, Bluetooth, and, increasingly, Wi-Fi. A number of security companies that provide antivirus software for computers including Symantec, McAfee, and Sophos have also introduced products for mobile phones.
>>