Featured Post
Elliptic Labs to bring Kinect-like technology to the iPad
- Get link
- X
- Other Apps
By
Rishoo Mittal
-
Microsoft’s Kinect add-on to the Xbox 360 certainly provides a new twist to traditional gaming. In case you’re unfamiliar, Kinect enables gamers to control on-screen action by using their bodies. Kinect works via 3D motion sensing technology which can detect an array of gestures and even facial features - and now comes word that similar gesture-recognition technology will be hitting the iPad, though not directly from Apple. MobileMag reports that Elliptic Labs will reveal their Touchless Gesture User Interface technology at CES 2011. Elliptic Labs sprung forth from the signal processing environment at the University of Oslo and what they’ve come up with is an iPod dock which creates a “touchless zone” that extends out about 1 foot in front and to the sides of the iPad screen. Users can then initiate a number of gestures to manipulate onscreen content. As an example, users can swipe their hands in the air to scroll threw icons or various pages on an app. Another supported gesture is the ability to start and stop a song from playing by pushing one’s hand towards the iPad.
Again, Elliptic Labs will show off their technology at CES 2011 which is scheduled to kick off on January 6. Incidentally, Aldrin notes that all of the hardware and sensors used in their technology are “off the shelf components.
Again, Elliptic Labs will show off their technology at CES 2011 which is scheduled to kick off on January 6. Incidentally, Aldrin notes that all of the hardware and sensors used in their technology are “off the shelf components.
Related Posts
Ex-HP CEO Hurd Pays $14 Million Bounty as Oracle Pledge Fee
By
Rishoo Mittal
-
Valleywag reports that ousted HP CEO Mark Hurd is paying dearly to roll with Oracle, giving up millions of dollars to settle the HP lawsuit that threatened to prevent him from working at his new job. Hurd will forfeit about 345,000 restricted HP shares that he was given as part of his HP exit package, which had a market value of $13.6 million. In addition to announcing the truce against the backdrop of Oracle's OpenWorld conference, HP and Oracle also reaffirmed their vows to each other.
The bug in the name of the C++ language.
By
Rishoo Mittal
-
From the internet, a popular quote goes like this: "Of course, while it is true that the ++ operator gives the C++ language its name, it also led to the first joke about the language. C++ haters point out that even the name of the language contains a bug: 'After all, it should really be called ... ++C, because we only want to use a language after it has been improved.' " We will now see why this joke is so absolutely hilarious. int main() { int x = 40; int y = ++x + 1; std::cout << x << '\n' << y; } Output: x = 41, y = 42. The pre-increment operator first increments the value of x (the ++) and then stores it in the variable. Hence, when the code is executed, x becomes 41 AFTER being assigned to y . The post-increment works the other way, the value is first stored in the lvalue before being assigned to the rvalue of the variable being incremented. int main() { int x = 40; int y = x++ + 1; std::cout <&l
Biography of The Rock 'n' Roll Drummer...John bonham....
By
Rishoo Mittal
-
John Bonham was born in the Midlands countryside of Worcestershire on 31 May 1948. He got his first snare drum at 10, a present from his mum. He joined his first band, Terry Webb and the Spiders, at the age of 16 in 1964. In 1965, he joined his second band, A Way of Life, and met Pat Phillips at a dance near his home in Kidderminster. At age 17, they were married. The band became inactive and Bonham, with a new wife to support, had either to make a go of drumming financially or quit. He had met a young singer, Robert Plant , a couple of years earlier, and Plant wa currently in a band called Crawling King Snakes, and they needed a drummer. Bonham fitted the bill. Bonham lived quite a way from the rest of the band and transportation costs (i.e. petrol money) stretched the finances of a struggling band to the limit. Within a few months, Bonham had left the band to rejoin the local A Way of Life. He was completely self-taught as a drummer, and despite this fact, or ma
Scrum Roles (Scrum Master, Product owner, Development Team) and collaboration between each other
By
Rishoo Mittal
-
1. What is one service a Scrum Master provides to the Product Owner? The Scrum Master is Scrum Framework expert and responsible for its adherence in creating a successful product. As an expert, he is the coach for both product owner and development team. Now if we talk about service a Scrum Master provides to the product owner - a product owner gets coaching from the Scrum Master especially for: • In choosing the right product management techniques and tools • In making product-related decisions • In determining product management practices. 2. Who can order the items in the Product Backlog? As per Scrum Guide, - The Product backlog is an ordered list of everything that is known to be needed in the product. It is the single source of requirements for any changes to be made to the product. The Product Owner is responsible for the Product Backlog, including its content, availability, and ordering. The Product Own
Wi-Fi WPA2 Zero Day Vulnerability Found
By
Rishoo Mittal
-
Black Hat conference: a claimed vulnerability in WPA2 Enterprise that leaves traffic open to a malicious insider. "...wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available. Malicious insiders can exploit the vulnerability, named 'Hole 196' by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network, and compromise other authorized devices using open source software, according to AirTight. 'There's nothing in the standard to upgrade to in order to patch or fix the hole,' says Kaustub
Comments
Post a Comment
Let's discuss and learn more