Thursday, 11 August 2011

US internet providers hijacking users' search queries


Editorial: "Hijacking web searches for cash threatens net success"

Update: Since the practice of redirecting users' searches was first exposed by New Scientist last week, we have learned that all the ISPs involved have now called a halt to the practice. They continue to intercept some queries – those from Bing and Yahoo – but are passing the searches on to the relevant search engine rather than redirecting them.

Original story posted on 4 August 2011

Searches made by millions of internet users are being hijacked and redirected by some internet service providers in the US. Patents filed by Paxfire, the company involved in the hijacking, suggest that it may be part of a larger plan to allow ISPs to generate revenue by tracking the sites their customers visit. It may also be illegal.

Reese Richman, a New York law firm that specialises in consumer protection lawsuits, today filed a class action against one of the ISPs and Paxfire, which researchers believe provided the equipment used to hijack and redirect the searches. The suit, filed together with Milberg, another New York firm, alleges that the process violated numerous statutes, including wiretapping laws.

The hijacking seems to target searches for certain well-known brand names only. Users entering the term "apple" into their browser's search bar, for example, would normally get a page of results from their search engine of choice. The ISPs involved in the scheme intercept such requests before they reach a search engine, however. They pass the search to an online marketing company, which directs the user straight to Apple's online retail website.

More than 10 ISPs in the US, which together have several million subscribers, are redirecting queries in this way (see below for a complete list). None of the companies would comment on the redirection scheme, but evidence collected by Christian Kreibich and Nicholas Weaver at the International Computer Science Institute in Berkeley, California, who discovered the redirection and have been monitoring it for several months, suggest that the process generates revenue for the ISPs.

The Berkeley team has identified 165 search terms, from "apple" and "dell" to "safeway" and "bloomingdales", that are passed to marketing companies and then redirected to the appropriate retail website. The marketing companies include organisations like Commission Junction, a Santa Barbara, California, a firm that retailers pay to supply traffic to their websites.

Organisations that provide Commission Junction with traffic, which may include Paxfire and the ISPs the Berkeley team monitored, receive a cut of any purchase their users make. The cut is typically around 3 per cent. Commission Junction said that it was investigating the behaviour identified by the Berkeley researchers.
Buy, buy, buy

The process is highly contentious. A user who searched for "apple" would easily have found the company's store via a search engine, so Apple may be needlessly sharing revenue with Commission Junction and the ISPs. Search engines are also being deprived of traffic intended for them. The ISPs are understood to have stopped redirecting Google search traffic after the company complained to them earlier this year. All the ISPs identified by the Berkeley team redirect some Bing and Yahoo searches.

The redirection can also produce unwanted results. A user wanting to read an article in The Wall Street Journal, for instance, might search for "wsj"; the redirection system would take them to a page offering subscription deals for the paper. Searches for "kindle" are sent to Amazon, the company that makes the e-book reader of that name. A normal search for the term provides links to Wikipedia, reviews of the device and links to Kindles for sale on eBay.

"This interception and alteration of search traffic is not just your average privacy problem," says Peter Eckersley at the Electronic Frontier Foundation, a San Francisco-based internet advocacy group that helped the Berkeley team investigate the ISPs. "This is a deep violation of users' trust and expectations about how the internet is supposed to function."

It is not the first time that the desire of ISPs to monitor and monetise the traffic they carry has led to controversy. In 2008, service providers in the UK suffered a backlash after it emerged that they were working with Phorm, a company that developed techniques for tracking the interests and activities of internet users. Advertisers and publishers already track users' browsing, but ISPs are in a particularly powerful position because they can observe almost everything we do online. Many users complained about Phorm's data collection, prompting several ISPs to sever links with the company.
Paxfire connection

In this case, examination of the redirected traffic has led the Berkeley team to believe that the service is provided by Paxfire. The firm, based in Sterling, Virginia, has provided advertising services to ISPs since it was founded in 2003. As well as using Paxfire to redirect specific queries, the ISPs pass many, or perhaps all, searches on Google, Bing and Yahoo through Paxfire servers – a process that places Paxfire in a similar position to Phorm.

Paxfire executives did not reply to New Scientist's multiple requests for comment, but the patents that Paxfire has been awarded, as well as others it has applied for, provide hints of its plans. In March, for example, company CEO Alan Sullivan applied for a patent for a system that would allow ISPs to create a "database of information about particular users" based on the searches and website visits observed by the service provider. The patent says that ISPs could use the information to display relevant advertising.

Paxfire is named in the lawsuit filed by Reese Richman and Milberg, alongside RCN, based in Herndon, Virginia, one of the ISPs identified by the Berkeley team. The suit, which was filed in the district court for the southern district of New York, claims that the two companies violated privacy safeguards enshrined in the Wiretap Act, a 1968 law that regulates electronic communications.

Want to check whether your ISP is monitoring your searches? Try running this tool developed by the Berkeley researchers.
Shielding searches from prying eyes

Feel uneasy about the possibility of your internet search provider keeping tabs on your searches? A simple fix is at hand. Last year, Google launched a service that encrypts its search traffic, including the search term itself. To turn this encryption on, just use "https" instead of "http" at the beginning of the address that you have bookmarked for Google.

If you're a Firefox user and want to use encrypted communication on other sites, including Wikipedia, Twitter and Facebook, consider installing the HTTPS Everywhere extension developed by the Electronic Frontier Foundation. The extension automatically turns on encryption for around 1000 sites that offer it.
List of ISPs that are redirecting some search queries

Cavalier
Cincinnati Bell
Cogent
Frontier
Hughes
IBBS
Insight Broadband
Megapath
Paetec
RCN
Wide Open West
XO Communication

Charter and Iowa Telecom were observed to be redirecting search terms, but have since ceased doing so. Iowa Telecom stopped its redirection between July and September 2010, and Charter stopped in March 2011.

Crowdsourced online learning gives robots human skills


TWO robots named Rosie and James are making pancakes. It's a tough task that requires coordination, planning and a fine touch with a spatula. Midway through the process, Rosie slides the spatula under the half-cooked cake, lifts the pancake from the heat and carefully flips it over. The crowd breaks into cheers.

Rosie and James aren't quite the accomplished cooks they appear to be, however. As far as robots go, they are as flexible as they come, but they move haltingly, and their complex routine is the result of painstakingly crafted software instructions. Give Rosie and James a different recipe, for example, and their performance would suffer.

It's an age-old problem in robotics, but one that might just have a solution. Roboticists traditionally go to great lengths to coax automatons to perform highly specialised tasks, like cooking crêpes. But now they are turning to the crowd for help in giving robots more general skills. By allowing people to pilot real or simulated robots over the internet in trial experiments, they hope to recreate the fast and flexible behaviour that comes effortlessly to humans. "Crowdsourcing is a really viable path toward getting robots to do things that are useful for people," says Chad Jenkins, a robotics researcher at Brown University in Providence, Rhode Island.

The idea is inspired by successes in other areas of artificial intelligence. For example, online translation systems are trained on pairs of documents that have been translated by humans. By comparing translations with originals, the software learns how to translate words and phrases between different languages.

A similar approach could lead to better human-robot interactions, says Sonia Chernova at Worcester Polytechnic Institute in Massachusetts. To collect information on teamwork, social interaction and communication, she and colleagues created Mars Escape, an online game in which two people each control an avatar, one human and one robot, and work together to rescue objects from a doomed Martian research lab. After Mars Escape went online last year, Chernova logged the dialogue and action from over 550 sessions of the game.

The researchers first had to throw out unusual records, like dialogue between players who traded obscenities rather than working together. Then they looked for common patterns in the data, such as methods that players frequently used to retrieve objects, and phrases they exchanged when doing so. By having software watch how people tackled the game, the software learned how to work with a human. The technique could also find a use in the games industry (see "Build a better baddie").

The real test came last January, when Chernova and colleagues mocked up a real-life version of the Martian lab at the Museum of Science in Boston. Visitors were paired with a robot powered by software based on the Mars Escape data. The results were encouraging, Chernova and colleagues say in a paper to be presented next week at the International Symposium on Robot and Human Interactive Communication in Atlanta, Georgia. Sixteen out of 18 visitors worked with the robot to complete the game and most said the robot behaved rationally and contributed to their success.

Jenkins had similar success with a proof-of-principle experiment. Last year, he wired up a wheeled robot for online access and invited people to guide it through a simple maze. Over 270 people took up the challenge. He used the data they generated to build a navigation algorithm that allowed the robot to complete a maze it had not seen before.

His next experiment is more ambitious. His lab has a state-of-the-art PR2 - the same class of robot as James - that it plans to make available online. The robot will be placed in a kitchen and users will be invited to help it perform common tasks, like fetching objects from cupboards. The data they generate could help create better domestic robots, says Jenkins. The online interface will be demonstrated to researchers this August and should be available to the public by the end of the year.

The initial experiments have also flagged up some potential problems. Players in the real-life Mars Escape complained that the robot had poor communication skills, for example. This may be because the real robot often prompted different behaviour to its virtual version. For example, some visitors issued commands to move a specific distance. No players in the online game issued similar instructions, so the robot had no appropriate data to draw upon.

If such problems can be tackled, the technique has potential, says Jenkins. Many researchers focus on domestic tasks, but people in the outside world might prioritise other uses once they get control of robots. He draws an analogy with the early days of the internet: researchers built a data-sharing system and did not anticipate the emergence of Wikipedia and social networking. As for what those other uses are, Jenkins says we will have to wait: "If I had a good sense of other great applications, I would be doing them already."
Build a better baddie

In Jeff Orkin's vision of the future, gamers doing battle in zombie-filled shoot 'em ups will be helping to build richer virtual characters. Orkin worked in the game industry before moving to the Massachusetts Institute of Technology. His system crafts artificial characters by observing how humans play.

The system makes recordings of dialogue and action from games, which are annotated so the software knows what is happening at each point. Then virtual characters in other games can tap into the annotated data to simulate human-like behaviour. Slain by a sarcastic swordsman or glib goblin? Next time, you might have to blame Orkin.

Home-made drone to help phone and Wi-Fi hackers


visible to radar, a drone flies over a city, while a hacker uses it to attack the cellphone network, spy on the ground and monitor Wi-Fi networks. But this is no stolen military vehicle. It is a home-made drone built for just a few thousand dollars using parts legally bought on the internet.

This is the future of network hacking, as envisioned by security consultants Mike Tassey and Richard Perkins. They have now built such a drone to prove how easy it is.

Using commercially available parts, they built a plane called WASP that can be a moving base station for cellphone networks, a flying camera and a Wi-Fi "packet sniffer" – all at the same time. Everything was bought legally and building it did not require much engineering know-how, they say.

The drone's frame was bought for less than $300 on the internet. A GSM radio turned it into a mobile version of a cellphone tower, a video camera monitored the ground, while internet connectivity came from a USB dongle that can be bought in any electronics shop. The total cost of their drone was about $3800, says Tassey. The pair presented their work at the Black Hat Conference in Las Vegas last week.
Flying fake

Using the drone to attack a cellphone network would be as easy as flying while broadcasting the same signal as an ordinary cell tower, the pair say. Most cellphones are designed to latch on to the strongest available signal. If the local 3G or 4G network has a weaker signal than the one broadcast by the drone then the handset will default to GSM and can be tricked into latching onto the drone's antenna, using it as a base station.

In tests, Tassey and Perkins showed that the drone could then listen in, record phone calls and transmit the data over the internet.

But it's not all bad news. The pair say that a drone could run search patterns for lost hikers at a fraction of the cost of using a helicopter, for example.

Sex on the brain: What turns women on, mapped out


It's what women have been telling men for decades: stimulating the vagina is not the same as stimulating the clitoris. Now brain scan data has added weight to their argument.

The precise locations that correspond to the vagina, cervix and female nipples on the brain's sensory cortex have been mapped for the first time, proving that vaginal stimulation activates different brain regions to stimulation of the clitoris. The study also found a direct link between the nipples and the genitals, which may explain why some women can orgasm through nipple stimulation alone. The discoveries could ultimately help women who have suffered nerve damage in childbirth or disease.

The sensory cortex is a strip of brain tissue positioned roughly under where the band between a pair of headphones sits. Across it, neurons linked to different body parts exchange information about the sensory information feeding into them. This is often depicted as the "sensory homunculus", a distorted image of a man stretched across the brain, with his genitals lying next to his feet (click here). The size of the body's parts show how much of the brain is dedicated to processing the sensory information from each body part.

The diagram was first published in 1951 after experiments conducted during brain surgery performed while the patients were conscious: the surgeon electrically stimulated different regions of the patients' brains and the patients reported the parts of their bodies in which they felt sensation as a result. But all the subjects were men. Until recently, the position of female genitalia on the homunculus had only been guessed at.

This changed last year when a team led by Lars Michels at University Children's Hospital in Zurich, Switzerland, used functional magnetic resonance imaging to confirm that the position of the clitoris on the homunculus was in approximately the same position as the penis in men. Barry Komisaruk at Rutgers University in Newark, New Jersey, and his colleagues have now used the same method to map the position of the clitoris, vagina and cervix on the sensory cortex as women stimulated themselves.
There, there and there

"This is hard proof that there is a big difference between stimulating those different regions," says Stuart Brody of the University of the West of Scotland in Paisley, UK, one of the researchers in the study.

Some have argued that women who derive pleasure from vaginal stimulation do so because their clitoris is being indirectly stimulated, but the current findings contradict this. "They support the reports of women that they experience orgasm from various forms of stimulation," says Beverly Whipple, also of Rutgers University, who was not involved in the current study.
It's the nipples, stupid

Komisaruk also checked what happened when women's nipples were stimulated, and was surprised to find that in addition to the chest area of the cortex lighting up, the genital area was also activated. "When I tell my male neuroscientist colleagues about this, they say: 'Wow, that's an exception to the classical homunculus,'" he says. "But when I tell the women they say: 'Well, yeah?'" It may help explain why a lot of women claim that nipple stimulation is erotic, he adds.

The next step is to map what other areas of the brain light up in response to clitoral and vaginal stimulation. Komisaruk would also like to see what happens when the area that supposedly contains the G-spot is stimulated, as women in the current study just stimulated the front wall of the vagina generally.

The findings could also help women who have suffered nerve damage in childbirth or because of diseases like diabetes. Michels has preliminary evidence that stimulating the clitoral nerve can improve symptoms of urinary incontinence, but says a proper understanding of how the nerve maps to the brain is needed to translate this into effective treatment.

Meanwhile, Komisaruk says that nipple stimulation could enhance genital sensation in women with nerve damage. "It could be a supplement for experiencing orgasm," he says.

Audi Urban Concept (photos)

Audi Urban Concept (side)


After not-so-secretly releasing a prototype of its electric microcar into the urban wilds for testing, Audi decided to let out sketches of its Audi Urban Concept.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967.html#ixzz1UizPRdmz


Audi Urban Concept (roof and windows open)


lthough its doors appear to slide open like a minivan's, Audi's write-up of the design insists that passengers enter through the tailgate, which could be a good thing depending on your parking space.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967-2.html?s=0&o=10008967&tag=mncol;page#ixzz1UizofwvT

Audi Urban Concept (side)


Its 21-inch wheels are freestanding yet covered by protective plates with LED lights.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967-3.html?s=0&o=10008967&tag=mncol;page#ixzz1Uj077jmN


Audi Urban Concept (interior)



The drawing reveals that it's a 1+1 that seats two passengers in a staggered formation rather than side by side.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967-4.html?s=0&o=10008967&tag=mncol;page#ixzz1Uj0UdDlf


udi Urban Concept (interior)


The car's body is constructed using ultralightweight carbon fiber-reinforced polymer.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967-5.html?s=0&o=10008967&tag=mncol;page#ixzz1Uj0eEQcv


Audi Urban Concept (interior)


The vehicle is powered by Audi's e-tron electric power train.

Photo credit: Audi

Read more: http://www.cnet.com/2300-10863_1-10008967-6.html?s=0&o=10008967&tag=mncol;page#ixzz1Uj0qLhEv

Tuesday, 9 August 2011

New Technology Spotted at IDF


An incredible new technology: IBM’s combination screw driver, level, and flashlight

Friday, 5 August 2011

Powermat Wireless Battery Charger



If you’re tired of carrying around one charger per electronic toy, you’re in luck. The Powermat lets you charge your iPhone, Blackberry, Nintendo DS, and most other gadgets on the same mat. One mat, one plug.

Google Wave

Google has a way of inventing things


Google has a way of inventing things that people do not know they need until they understand the product. Its latest such creation is Google Wave. It’s not email. It’s not chat. Rather, a Wave is a document that acts like a conversation, live and changeable on the fly. Rich media drives the experience. But you won’t really know how much you need it until Google actually gives it to you.

MyKey by Ford

Teens have a propensity for unsafe driving.


That’s hardly news, but what parents can now do to encourage safe driving is. The MyKey can be set to control the vehicle by limiting speed, chiming when the gas tank is 75 miles from empty, and limiting the car’s audio by as much as 44%. Kids will hate it. That’s probably why it’s such a good thing.

The Honda Bicycle Simulator


As part of a universal quest to replicate outdoor activities without actually going outside, Honda has unveiled a new kind of bicycle. It doesn’t actually go anywhere, but it does simulate real-life situations riders may face on the way to work or the store. Think of it as defensive driving for bicyclists.

Monday, 1 August 2011

Portable Hotel Alert Systems

The Travel Door Alarm Keeps You Safe on Trips


TRAVEL DOOR ALARM

If you’re worried about staying in a sketchy motel due to a faulty car, you can ease your worries by carrying the Travel Door Alarm with you.

For those who are paranoid about creepy guests sneaking into their hotel rooms, the Travel Door Alarm will help you sleep a little better at night. It’s easy to use and easy to set-up. Simply hook it around the door knob and you’re good to go. Any intruders who walk in will have to deal with a loud high pitched 91dB alarm that will make them think twice about stealing from your room. In addition to its protective capability, there’s also an LED light on-hand. This would make a great travel companion for those who place a high emphasis on safety.

Faucet USB Hubs

The Charging Tap Makes You Conscious of How Much Energy You Consume


CHARGING TAP

Although we all know the importance of leading energy-efficient lifestyles, we still tend to waste a lot of power; enter the Charging Tap to save the day. Since we have been trained for much longer to keep tabs on our consumption of water, this unique design brings this level of consciousness to our use of energy.

Designed by Qi Weijia, the Charging Tap takes the form of a faucet. To use it, all you need to do is hook up your gadget via its USB cable and then turn the tap. It might not do much more than that, but its aesthetic will surely make you think twice before wasting any more needless energy.

The Charging Tap is also a very adorable design that is perfect for youthful tech users.

Digital Depressant Devices

Ludwig Zeller's Optocoupler Provides an Escape from Technology


OPTOCOUPLER

It was only a matter of time before someone created something like the Optocoupler. The Optocoupler essentially relieves the digitally depressed brain by introducing a spalike environment just for the head.

Designed by Ludwig Zeller, who is known for channeling his fascination for everything science-fiction into design, the Optocoupler encourages users to come home after a hard day at work and use it to decompress and relax. Basically, once you lay down and encase your entire head within the triangular Optocoupler, it begins to project disco-ball-esque strobing patterns onto your face while a digital cracking sounds off as well, lulling you into calmness.

The Optocoupler was created to provoke thought and discussion more than anything else, however.
Published: Jul 31, 11 • References: ludwigzeller.de and fastcodesign

$90,000 Speakers

Proscenium Black Diamond III is Luxurious Listening Equipment for Audiophiles


PROSCENIUM BLACK DIAMOND III

Audiophiles and vinyl enthusiasts may have just had their dreams come true with the release of the Walker Audio Proscenium Black Diamond III record player, which bears a $90,000 price tag. Walker have mastered the art of vinyl stereo sound with this model, offering the classic charming phonographic sound without any static or white noise. The player is set with a self-cleaning air bearing arm with 45 psi air pressure capabilities to achieve this clear and outstanding sound quality.

The black and gold-lacquered stereo weighs in at 250 pounds, and looks just as good as it sounds. The Proscenium Black Diamond III is proof that vinyl will always have a solid fan base, and remains the most sophisticated way to rock out.

Computer-Generated Nudity

The Revealing Olivia Wilde 'The Change-Up' CGI Dares to Bare


WILDE 'THE CHANGE-UP' CGI

Nudity in films becomes an even more complex affair in the Olivia Wilde ‘The Change-Up’ CGI scene, in which computer-generated nipples were added to the star’s body for a love scene with co-star Ryan Reynolds. Wilde, who is having an unstoppable year, starring in five films on top of the popular TV series ‘House,’ wanted to keep it kosher on the set of ‘The Change-Up’ and opted for the computer-animated solution.

The comedy film set to release on Aug. 5, 2011, includes a bedroom scene between the two actors in which Wilde appears completely topless, despite her wearing pasties during filming. The young actress was asked in post-production to approve a pair of computer-animated nipples for the scene—a completely innovative and extremely useful feature of modern film production.

Computer-generated nudity was previously implemented to remove Jessica Alba’s undergarments for the 2010 film ‘Machete,’ but this is the first time it has been used for more detailed jobs. The Olivia Wilde ‘The Change-Up’ CGI nudity might be the first of its kind, but is definitely not the last, as it offers a safe and easy alternative for film actresses.

Modernized Retro Stereos

The Slice Dab Radio Has a Traditional Touch With Modern Tech


SLICE DAB RADIO

Retro designs outfitted with modern technology may not be a new concept, but that doesn’t mean the Slice DAB radio won’t be coveted by anyone who happens to stumble upon it. A sleek, slim stereo with traditional touches like dial knobs and a wooden body, it is certainly attention-grabbing.

Designed by Sam Aylott, the Slice DAB radio may boast some elegant elements that were seen back in the 70s such as its steel handle, which contrasts nicely with the laminated wood material below it; nevertheless, it includes some rather hi-tech details as well. For instance, images and text will be displayed on one of the knobs. Therefore, the Slice DAB radio doesn’t let itself get lost entirely in the novelty of a bygone era

Tablet Payment Processors

PayWare Mobile Enterprise for Tablets Lets You Pay With Your iPad


PAYWARE MOBILE ENTERPRISE FOR TABLETS

Cash registers may become a relic of the past thanks to technological innovations such as the PayWare Mobile Enterprise for Tablets. Created by VeriFone, PayWare Mobile Enterprise for Tablets is a set of software and hardware designed to turn tablets into credit card processors.

PayWare for tablets comes hot on the heels of the many credit card processing apps and gadgets already being offered. Whereas most of those add-ons and apps are used for small-time purchases, VeriFone is thinking bigger and is targeting larger businesses that rely on physical cash registers and bulky credit card machines. Testing is set to begin this fall, with VeriFone hoping to get their new PayWare available to businesses sometime in 2012.

Gender-Biased Washing Machines

The Almighty Laundry is Built Specifically for Men


ALMIGHTY LAUNDRY

The Almighty Laundry washing machine concept is quite ingenious. Although some may scoff at the idea of men getting a washer that specifically targets their needs, I think that it would simplify the process of cleaning their clothes without incurring extra expenses such as dry cleaning bills, not to mention any other hiccups along the way.

Designed by Won Suk Lee, the Almighty Laundry washing machine concept essentially utilizes a closet-style rack in the machine that allows the user to hang his work shirts easily and conveniently without the fear of ruining them. It also features separate compartments for the boxer shorts, socks and towels. What is even better is that the user won’t even need to iron his shirts after they have been washed.

Electronic Pool Butlers

et the RC Snack Float Bring Refreshments to You


RC SNACK FLOAT

The next best thing to being in a pool with sunglasses and beer is to have the RC Snack Float with you.

Who doesn’t love lying in a pool with a cool drink in their hand as they make like Sheryl Crow’s song and soak up the sun? The only problem is getting up to grab another drink because that just spoils the mood. So, instead of making the effort to get up, take advantage of the RC Snack Float. This is a multi-compartmented device that floats on water and will hold your snack in the middle and five drinks around it. Yes, it’s remote controlled so that means you don’t have to tie it to a string and keep it from floating away. Not a bad companion to have when you’re enjoying the pool.

Satelite Replacement Blimps

The Lockheed Martin HALE-D Will Prove Invaluable to the Military


he satellites in Earth’s orbit are more than 50 years old, so it is high time that they went into retirement and were replaced with new designs that boast younger, more robust technology such as the Lockheed Martin HALE-D (High Altitude Long Endurance-Demonstrator). Lighter than most air vehicles out there, it won’t need to be manned by anyone. By harnessing the power of the sun, it will act as a surveillance platform, telecommunications dispatcher or an observer of weather conditions. It will also keep an eye on battle zones.

Though the Lockheed Martin HALE-D will be able to perform a lot of everyday tasks that effect the majority of the population, it will prove invaluable to military operations and personnel.

Tablet Home Theatres


Companies are still trying to find ways to make the Apple iPad as convenient and all-consuming a device as possible, and that now includes converting it into a mini home theater with the iLuv iMM514 ArtStation Pro docking station. Since one of the best features of the iPad is to use it as a substitute TV, this device really makes doing so much more enjoyable.

The iPad essentially attaches to a swiveling attachment that allows it to be switched between a portrait or landscape position perfect for watching movies or browsing the Internet. The iLuv iMM514 ArtStation Pro’s relatively large base is equipped with a speaker accompanied by a wireless remote. Interestingly enough, it is also compatible with the iPhone and iPod Touch.