Powered by Blogger.

MYSITE Headline Animator

Related Tags

Friday, 25 March 2011


Produce a relatively low temperature, using the Arctic Cooling Twin Turbo Pro

Calibre doesn't ever miss to update their graphic cards product. Calibre also known always use 3rd party cooling system on each product. Not only that, Calibre is also identical to overclock, almost the entire product launch always has a core and over clocked higher than the reference version.

It is also applicable to their latest products, Calibre GTS 450, this graphics card comes with 1GB DDR5 memory capacity. This card even comes with an unusual HSF. GTS450 provide solutions to a large cooling system, and two fans who also are large. HSF is the Artic Cooling Twin Turbo PRO which has 3 heatpipes that distribute heat from the GPU to the heatsink and removed through the two fans. 

So, how exactly effectiveness of HSF? after going through 3DMark Vantage testing to determine performance, and the resulting temperature (tests conducted by an agency in Indonesia). In 3DMark deault settings with 1280x1024 resolution that all successfully passed without a hitch with a score of 8766. This score is higher than the scores obtained by the GTS 450 references.

In Gamming Benchmark DXII, using stalker: call of Pripyat. this Graphics card has good performance. and on more detail picture test with 1920x1080 resolution,  on average this card produce 79 FPS. What is even more surprising when the temperature measurement is produced, because the graphic card produces a very safe temperature. The heat generated when idle is 26°C , and 38°C at full load. This proves the ability of HSF Arctic Cooling, that used is work effectively.

But you should know, if you think the performance of this card is not too different from previous series namely the GTX 460, you seem to be a little disappointed because the results obtained from the tests above, it isn't better than that obtained by the GTX 460. but it can be understood because the specifications of both which are very much different.

Technical Data:
GPU codename: GF106, Core Technology: 40nm, Core Clock: 851mhz, Stream processors: 192, Memory DDR5, Memory Clock: 950mhz, Memory Capacity: 1024MB, Memory Interface: 128 bt, D-sub: N / A, DVI: 2 , HMDI: 1, Display Port: N / a


Tuesday, 22 March 2011


High Performance Graphics Card 

Sapphire improve HD5770 graphics card product line by introducing SAPPHIRE HD5570 Flex Edition, with 1GB memory size and interface GDDR5, graphics card comes with a cooling time that is different from previous series. Although not many changes made in this graphics card. From the display this product looks similar to Sapphire HD5770, which is different in this series lies in the connector DVI-I Dual Link, which is found in the graphics card flex edition only.

As information, a single link DVI port is only capable of displaying images with a maximum resolution of 1920x1080 and a refresh rate of 60 Hz, while the Dual Link DVI ports capable of displaying images up to 2560x1600 resolution. other than that a DVI-dual link also has increased in terms of speed and signal quality, which can provide comfort to you when playing games or watching movies.

Sapphire HD5770 flex edition has supported the use of ATI Eyefinity with 3 monitors without requiring additional cables Display Port which are quite expensive. Sapphire flex edition also allows you,  to use 4 monitors in a single graphics cards in mode single Large Surface (SLS).

In some tests, such as by using 3DMark Vantage by several agencies in Indonesia. test results showed that the latest graphics card from Sapphire have good performance. In addition, testing gamming also has been done to this chip to obtain realistic results. and the result, these chips can go through all the testing with satisfactory results.

hardware,graphic card

For main stream graphic cards category, these products include products that have high performance when compared with other products in the same category. with the test results are satisfactory and low temperatures, this product can be your choice to accompany you play games, or watching movies with good quality
picture. And features ATI Eyefinity, will make you more comfortable while you are in front of your computer.

Technical data :
GPU codename: Juniper, Core Technology: 40nm, Core Clock: 850MHz, Stream processors: 800Unified, Memory : 1200Mhz, Memory capacity : 1024MB, Interface memory : GDDR5, D sub : -, DVI : 2, HDMI : 1, Display port : 1

Friday, 11 March 2011


Rely the reference boards, reference cooling, and factory overclocked support

Recently, NVIDIA has launched a chip-based products GF110. One of its products is the GeForce GT570. Like the other new graphics card launch, many manufacturers who develop their products from this chip, one of them is EVGA

Although the GTX570 is still a new product, but EVGA respond quickly. In fact, EVGA trying to create product with the stamp "SuperClocked" (SC), SuperClocked EVGA is one of the three series of factory overclocked and is the lowest ranked of the three series. for this product EVGA raise the clock speed of 65 MHz for the core, 130Mhz for the shaders, and 25Mhz on the memory.

For their factory overclocked product, the EVGA still believe with the stock coolling vapor chamber, the
property of Geforce GTX570. as well as PCB design that still uses reference board. Chip GF110 that became the center of the process on the GeForce GTX570 comes with 480 shader or called CUDA cores. Just by making some changes in the power management and cooling.The amount is the same as GeForce GTX480, the high-class monster graphics card owned by NVIDIA.

This change makes GeForce GTX570 work more efficiently and lower temperature
. In the testing phase, the core graphics card temperature at idle is 49°C, and it reaches 85°C when full load. Although somewhat higher, the temperature is much lower than the GeForce GTX480 temperature , which reached 95°C when full load. Not only that,  you also will not hear the noise of the fan in the cooling system.

Other advantages ofthis product can be seen from the results of 3D Mark Vantage test, which achieved a score 21,793 points for 1280 x 1024 resolution, and 15,766 points for 1920 x 1080 resolution. same result was also obtained in gaming benchmarks DiRT2, stalker: Call of Pripyat, and Crysis Warhead. Although sometimes, in the Crysis test with a 1920 x 1080 resolution , FPS obtained become lower up to 27fps but the game is still comfortable to play,

And for those of you who are not satisfied with the performance of this product, NVIDIA provides support the international answering up to 4way that will make this graphics card capable of devouring all the latest games without resistance.

Technical Data:
GPU codename: GF110, Core Technology: 40mm, Core Clock: 797Mhz, Stream Processors: 480 units, Memory: GDDR5, Memory Clock: 975Mhz, Memory Capacity: 1280MB, Memory Interface: 320 bytes, D-sub: N / A, DVI : 2, HMDI: 1, Display Port: N / A

Monday, 21 February 2011

AMD Fusion APU.

The balance between performance X86, Graphics, and Parallel Computing.

AMD Fusion Accelerated Processing Unit (APU) is a category of AMD's latest mobile chips that had been carried Neo AMD Athlon processor, VIA Nano, Intel Atom, and Intel Core ULV.

AMD has long stated its intention to merge the ability of the x86 CPU (general purpose, and serial data processing) and discrete graphics GPU, which excel at data parallel processing. Precisely since they do a merger with graphics manufacturer ATI in 2006. finally in 2011 in Events CES 2011 in Las Vegas last January, AMD formally announced the official attendance at APU that claim is supported by a number of large vendors such as Acer, Asus, Dell, Fufitsu, HP, Lenovo, MSI, Samsung, Sony, and Thosiba.

APU is part of AMD's Fusion architecture introduced since 2009. combination of CPU and GPU in one chip APU that looks simple, but in fact, it is a series of development process and production process are complex and time consuming. Barriers are not just about hardware implementation in this case is to merge CPU and GPU, but also in the design process to work optimally on CPUGPU technology (general purpose computation of Graphics Processing Unit). Just like OpenCL and computers are starting to be used directly in the software, Fusion Architecture needs to be designed carefully to ensure that can be developed further for the next two or three generations. Other factors are the focus of AMD is to create
compatible architecture with the previous generation architecture and next generation.

Unlike Intel which is independent in the chip manufacturing process.. AMD relies on other parties in the APU chip manufacturing process, for zacate APU (E series) and Ontario (Series C) using 40nm production technology from TSMC.and scheduled to finish in 2011, many others APU Fusion, such as the Liano (series A) are targeted for deskop, will use the 32nm production technology from Global Foundries. AMD Fusion APU first released, consisting of four series, two Serie (Zacate) and two series C (Ontario). Series E (zacate) targeted for mainstream notebook, all in one. And Small Form Factor (SFF) deskop, consisting of E (1.5GHz single core with a TDP of 18 W) and E-350 (dual core 1.6 GHz with TDP18W). The second series (Ontario) is targeted for a netbook or a tablet, consisting of C-30 (single core GHz with a TDP of 9 W 1.2) (1.0 GHz dual-core processors with TDP 9 W) C and-50.

Next target: consumer electronics

Intel has stated its intention to enter the consumer electronics area with the presence of atoms embedded chip, which is implanted in the Google TV. Although AMD has not entered into the world of tablet that becomes a trend in the market, AMD still believe if they X86 technology, is ready to compete with Intel and other development company.


Sunday, 20 February 2011

A new innovation in IPHONE 4

have the latest phone from apple, namely iphone 4. This isn't only a desire to enjoy the sophistication of multimedia fiture. However, iPhone 4 also has become a trend gadget in 2011 with some new innovations in it, which is increasingly moving towards the use of data as the main base phone. So, what's the iphone 4 advantage, when compared with the previous iphone issued by apple. please read the following brief explanation.

as an example, I'll try to compare the iPhone 4 with  the iPhone 3Gs.

Data Access
When compared with the previous iPhone, namely iPhone 3GS. iPhone 4 have been modified as well as possible to speed data access and provide convenience to the users. For example on iPhone 3GS still using HSDPA data network, which has download speeds up to 7.2 Mbps. Meanwhile, on iPhone 4 have used HSUPA networks, with download speeds up to 5.8 Mbps.

in addition, iphone 4, the processor has a larger capacity than the processor capacity in iPhone 3GS. iPhone 4, has 1GHz processor capacity, with 512 MB of RAM (Random Access Memory), while in iPhone 3GS use 600MHz processor with 256 MB of RAM. Of course, the improvement of hardware and data network in the iphone 4, have been able to cover the shortfall in the previous gadget. even it is not only done in hardware but also software that includes the features in it. so I think it's fair, if now iPhone 4 be hunted by the lovers of gadgets.

iPhone 4 have an application that is certainly different from the previous gadget, because the gadget is equipped with FaceTime applications, which can be used for videocall activities, when the feature is activated it will show two faces of those who are conducting a conversation using videocall.
IPhone front camera has VGA resolution, but unfortunately, to do FaceTime you have to use wifi, and both handsets have the same type, and have the same application as well. But if you do not already have iPhone 4, you do not need to be disappointed because you can still use the FaceTime to make a videocall, by injecting the application to the Macbook.
in addition Facetime, there are also other leading applications contained in iPhone 4, namely Retina Display application, this application has a screen resolution of 960x640 px. This resolution certainly larger than the iPhone 3GS which has a resolution of 480x320px.

Thursday, 17 February 2011

Safety Tips For Using a Public Computer

Read these tips to help keep your work, personal identity, or other information private.

I am sure, now you have a PC or Notebook, or other device which you use to perform your daily online activities, but, if one day requires you to use public computers for any reason, and you have to logon to your account. in fact, it can lead to your identity such as, email address, password, and other your information about are unsafe. if you don't pay attention to safety factors when using a public computer. These are simple tips which I will share to you, when you use public computers at cafes, airports or other public places. so you can be safe when you use them.

1. Don't save your logon information
Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
Many programs (especially social networking Web sites, Web mail, and instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.

2. Don't leave the computer unattended with sensitive information on the screen
If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.

3. Erase your tracks
if you browse using internet explorer, On Internet Explorer8 offers InPrivate browsing that leaves no trace of specific Web activity. For more information, see Browse privately. it also keeps a record of your passwords and every page you visit, even after you've closed them and logged out.
Disable the feature that stores passwords
Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.

1. In Internet Explorer, click Tools, and then click Internet Options.
2. Click the Content tab, and then click Settings, next to AutoComplete.
3. Click to clear both check boxes having to do with passwords.

Delete your temporary Internet files and your history
When you finish your use of a public computer, you can help protect your private information by deleting your temporary Internet files.

4. Watch for over-the-shoulder snoops
When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.

5. Don't enter sensitive information
These measures provide some protection against casual hackers who use a public computer after you have. But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief. Then it doesn't matter if you haven't saved your information or if you've erased your tracks. They still have access to this information.

hopefully useful

Saturday, 12 February 2011

UEFI, BIOS replacement candidate

Last time for BIOS is near, and will be replaced by newcomer "UEFI". Your computer will be faster, safer, and strongerlet's see the reasons.

Bios menu's (basic input / output system) that are blue and less structure, has come since 30 years ago, the BIOS will detect the hardware and prepare the necessary interface Interface for Windows or Linux boot process. In fact, Bios developed for PCs since the 80s and remained unchanged until today.

In the 2000s, Intel developed a new interface, called firmware EFI (Extensible Firmware Interface). since 2005, Unified EFI Forum, which consists of large companies such as Intel, AMD, Apple, Dell and Microsoft has reviewed the UEFI specification (unfied EFI). UEFI has evolved into an interface that is easy to operate, faster, stable, lightweight and safer. indeed until now there is no UEFI-based systems. but let us see what is offered by this new BIOS. and how the computer will boot.

Bios boot process can be seen that the PC is turned on in seconds until the windows screen appears. This is a process called POST (Power On Self Test). In the classic PC BIOS, this process will initialize all the hardware contained on the motherboard. Starting from the CPU and then examine some of its functions. Bios works as an abstraction so that the operating system doesn't have to activate the other PC components directly. drivers should be loaded at the operating system is active. Typically, the BIOS will seek Bootloader on the first 512 bytes of all drives. On Bios-based Computer, Bootloader usually located in the MBR (Master Boot Record). MBR create a partition on your hard drive, when the bootloader has been active, the operating system will run. However, PC-BIOS shows two basic weaknesses.
  • First, the Bios based on byte code assembler 16, so it can't directly initialize the new 64-byte.
  • Second, don't have the same specifications. each manufacturer makes their own variants.
With UEFI, forun participants wanted to create uniformity. each process will be defined in detail. UEFI boot process on Board (Platform Initialization (PI)). This can be interpreted as follows. after the computer is turned on, will take place Pre-EFI Initialization (PEI), which is activated in the CPU, memory, and chipset. subsequently, the process of switching to the Driver Execution Environment (DXE). at this stage, other hardware will be activated and even it done only in one step. at this stage it is definitely an advantage in terms of speed can already be felt. UEFI integrate a variety of drivers, so no need to load operating systems run on time. because these drivers don't depend anymore on the system, and we only need to program a variant only. therefore at the initial boot, NetworkCard and other functions such as: network boot or Remote Maintenance already can be activated, in addition, active grafihics card will display the simple menu interface.

Booting will be faster because they do not need anymore melaukan pengrcekan bootleader on all drives available. Boot drive has been determined since the operating system installation. So that becomes the standard boot process. But this is not the only advantage gained if we use the UEFI. On the other EFI partition, such as hard drives, a variety of applications can be stored, so that when the new operating system is running, you can run diagnostic applications, such as sytem tool, etc.

HDD 3 require UEFI
Currently, 3 TB hard drives have a lot in the market, such as: Barracuda XT 3000Gb. But until now UEFI isn't ready to use. whereas for use of this giant hard disk required special software or drive.

BIOS-PC can only access 2³² sectors, 512 bytes in size through the conventional master boot record. This means that the maximum hard disk capacity is 2 TB. Seagate uses a slightly larger sector to at least be used in windows, but this makes the problem, the BIOS can't boot from this disk.
Conversely, UEFI based on GUID Partition Table (GPT) can process up to 2⁶⁴ sectors, so this is equivalent to 9 Zettabyte (1ZettaByte = 1 billion TB). Although GPT hard disks can be used on windows Vista. But boot only works with UEFI motherboards. As Intel DQ57 SPI TM and vista 64 Byte. Reportedly this year, Intel and other vendors will offer more UEFI motherboard than the Bios.

Thursday, 10 February 2011

Trend Micro released USB Security 2.0

No matter what, not only in the PC or Notebook, various USB devices can be also infected by virus. This problem often experienced by PC users around the world. Therefore, on January 7th,2011, the Trend Micro a manufacturer of security applications, released the security applications for any port in USB devices, namely USB security 2.0.

Trend Micro security program’s can prevent the entry of viruses and malware into a USB device that connects to your PC or notebooks, so consumer’s USB device would be safe to use. Highly total protection granted the application for USB devices. Trend Micro also integrate several new features in version 2.0 are the Real time Virus Scan, the Auto-Update, and the Reference of log.

Real-time virus scan. Trend Micro USB Security offers real-time scans so that if a threat is detected, an alert screen will be displayed and the infected files will immediately be isolated.

Auto-update on pattern files. Because of the changing nature of threats, Trend Micro USB Security automatically updates its pattern files. Manual updates are also an option.

Meanwhile, Reference of logs. The reference log keeps an interactive list of virus detection results where users can restore or delete any file on the quarantine list.

well,  are you interested to download this application?  if so, you can go to www.trendmicro.com or directly from this page at  trendmicro.

Wednesday, 9 February 2011

Muvee Reveal 8 supports to iPad and iPhone-4

gambar sofware,muvee reveal
Muvee Reveal

Entering the 10th year muvee Reveal applications presence in the world of video editing, Muvee Reveal continuosly improve their services by doing innovation on the features and the function of their applications. such as the latest version has just been released, the muvee Reveal version 8. These applications more flexibility as it supports Apple devices, such as iPad and iPhone-4. Of course this new feature will allow the users of these devices become more comfortable and flexible. Because they can export HD video to these device so that it can be shared to the internet.

This is the answer to a request from the HD camcorder consumers that use the iPad and iPhone. And now you can enjoy the high-quality HDvideo on your mobile devices.

for those of you who want to get this application, you can go to www.muvee.com or directly from this post on Muvee Upgrade to upgrade to the latest version.

Monday, 7 February 2011

Android Used as a Satellite

Android phones probably will not only serve as a Smartphone. A satellite development company in UK have a crazy plan to use android phone as the brain of satellite.The experiments are currently being undertaken by Surrey Satellite Technology Limited (SSTL) in Guildford, England, as part of the initiative using advances in technology to make the cost of the satellite be cheaper.The idea of this project makes sense. As reported by the BBC, the SSTL assess modern Smartphone is remarkable after 1 GHz processor equipped and has a large capacity memory, especially android phone that has an additional SD card slot.

In this case, a smart phone comparable to mini-computer with self-power supply, input-output interface, and radio communication-that is very similar to the main components of a satellite. The difference is, the satellite requires hardware that has been specially designed directly on the CPU level, electronic equipment that has sufficient resilience to be in space-systems and handheld devices that overall, the cost of the design and manufacture of satellite becomes very expensive.For mild and simple mission, in fact nano-satellite (satellite mini) is much cheaper than the usual satellite-primarily the cost of shipping into the sky. However, innovations developed by SSTL will rise one level above it, namely by combining nano-sized satellite with a Smartphone.

SSTL was not going to make any changes or adjustments on the Smartphone’s official prices 450 dollars used. They will only relate to the satellite circuit using standard connectors. A camera will be installed in the satellite (Strand 1) that overlooks the Smartphone screen to ensure that the satellite malfunctioned and facilitate supervision from headquarters.

How does it work?
First, the Strand will work using electronic capabilities and control the hardware it self, and will bring other experimental equipment, including cameras that will take pictures of Earth from above.Furthermore Strand will check whether the android phone is still functioning or not. If it works, android phone will take over control (recognized by SSTL, for this function they are designing a special application installed on the mobile android). Furthermore, satellites that have been taken over entirely by the android phones will SASL position using the GPS function is in it, and then control it with gyros and mini-jet plasma. Mobile also will take pictures from orbit satellite itself.

Doug Liddle, Head of the Science Lab SSTL, explains, they have test against android mobile phone inside an airtight chamber in the earth to find out whether mobile phone stand if laterexposed to conditions that are not the same as the earth. Mobile Google android stated pass-is expected to stand to be in space for a year non-stop. Doug and his group believes the first launch will take place third quarter this year will go well.

Why are these findings interesting? If the experiment is successful, there will be a new chapter in their own satellites with a more cost-saving up to hundreds of thousands of pounds (from about 10 million pounder sterling) for simple missions are small. Satellite technology is increasingly important role in our lives in times to come. Of course, this discovery is very important and strategic.

Thursday, 3 February 2011

BlackBerry Application - For Moslem

handphone,ponsel,smartphone,gadget,Blackberry image,mysite image
BlackBerry img.5

Increasing the number of BlackBerry users in Indonesia has created fierce competition among the cellular phone entrepreneur, is no exception the cellular network providers, to further increase the number of subscribers of their network. they also compete to create new innovations for their products and services, one of them by providing services to download for free BlackBerry application as done by indosat. One of the largest cellular network provider in Indonesia.

MoslemGuide application, is the latest application released by Indosat. The launch of this application is claimed as offerings to Indosat customers in Indonesia. Indonesia as a big country with large population and most of the population are Moslem, of course, launching this application isn't just a right decision, but this is a smart move that has been taken by this company

Here are the features that exist in the BlackBerry Moslem guide application :

1. About

Moslem Guide is a BlackBerry application, which is useful as a tool or guide the Muslims who want to do worship.

2. Translator from Indonesian to Arabic
In this feature, available trans tool from Indonesian to Arabic, it will be useful for Muslims who want to learn Arabic.
3. Islamic Ringtone and Islamic Themes
if you download this application, you will find many islamic ringtone and themes that you can donwload for free to your blackberry.

4. Salaat Schedule

This feature also provides the Salaat schedule is updated every day According to the city where you live (in Indonesia).  When you 're traveling. You can use settings to choose the city where you are, (in the menu > City List). Then check the Automatic Update Schedule, then click the save button to save changes. After that, press the button click manually update, then, the Salaat schedule will adjust to the time of salaat schedule in the city of the area.

5. Mosque
This feature can help you to find the nearest mosque in the city where you are, just by clicking on one of the mosques in the list of the mosque, then you will receive detailed information about the location of the mosque. Even if you visit a mosque that isn't exist yet in the database . You can add it to the database application by clicking on the coordinates, then click add. and the location of the mosque will be directly stored in the database.

6. Search Qibla Direction
This feature allows your Blackberry to find Qibla direction where you are. and to do that you only need to tick the option Use Google Maps. Then click the Use a GPS, if your BlackBerry already supporting GPS service. but click the button Use the LBS, if in that area,  your BlackBery doesn't support GPS services.

7. Halal Guide

This feature contains the halal products that have been approved by the Indonesian Ulema Council (MUI). In this feature there is also a search menu to help you find a product or a restaurant.
to use this feature, you only need to enter the name of product in the search field, then press enter, this feature will display the product or restaurant that you are looking for. it is amazing, isn't it

8. Al - Quran Digital

Other features in the MoslemGuide is Digital Al - Qur'an, you don't have to worry about the authenticity. because this feature have been inspected by the Ministry of Religious Affairs of the Republic of Indonesia

9. Daily Devotional.

This application also features a Daily devotional. which provides a daily devotional is famous Ustad or Ustadzah in this country. In my opinion, this feature is the best feature of this application. Using this feature will be able to open your heart and your mind, please install this application, and get the most from this feature. to use this feature you only need to choose the title of musings on the list which is already available . and click enter (ok).


This application is compatible for BlackBerry which uses the Operating System version 4.5 , and can be used by all types of BlackBerry.


if you wish to download the application, you can directly go to the webpage from here on moslemguide or through Indosat-iGo, select the BlackBerry menu and select menu Moslem Guide.

note :
This application can be downloaded only by Indosat customers, and applicable only in Indonesia.

Thursday, 27 January 2011

Compress Photo, to Speed Up Email

BlacBerry img 4
You may have experienced barriers, when you send an email which containing photo attachments using the BlackBerry, usually, it happens because the resolution of the image you wish to send is too large. So, is there a solution for that? of course it is, you only need to edit photos and compress, so the file size can be smaller and this will accelerate the delivery via email

However, you need the right application to do that, but if until now, you don't have that application, you don't need to be disappointed, because the Blackberry development company has been providing them for you, and you can get them anytime you want.

There are two types of applications for BlackBerry that serves to compress images. namely, Resize Photo Editor and Image Edit. Both are the excellent application, and very easy to operate, and also very economical because it doesn't require large memory space to store it on your Blackberry.

following I will explain briefly to you about, more functions, how to use it, and how to download this application.

after you download this application, you can compress and resize the photo which has high resolution becomes lower. so you no longer need to get in trouble, when sending an image file attachments via email or mms using your Blackberry.

how to use it :

  1. Select menu  >>  then select the image editor icon (located in the download folder),
  2. Next, go to the image gallery and select an image.
  3. Then press the blackberry menu button, and scroll the trackball (trackpad) to select the size of the image (picture), click on the image to be compressed.
  4. After that the application will display several options. (select the size and image quality you want).
  5. Then, kilk Next, it will show a review of the newly compressed image.
  6. Then click Save.


handphone,ponsel,smartphone,gadget,Blackberry image
BlackBerry img 6
  • You don't have to worry, the original image will be lost, because the original image and image compression, will be stored in the gallery and use a smaller memory space.
  • Specifically, to the old type blackberry, it will require a large memory to run this application.
how to download
You also no need to worry, will lose a lot of memory space if you download this application, because the application size is only 138kb. if you're interest to download it, you can go to the blackberry appworld directly from the link on this post, and get the latest version,

- hopefully useful -

Other BlackBery Tips :

- BB Application for moslem
- internal Memori management
- Free Download BlackBerry Application

Monday, 24 January 2011

UFO Traces Found in Indonesia

UFO,trace,indonesia,jejak ufo
UFO trace - img.1
UFO phenomenon has existed and was known for centuries ago, but until now no one could prove it scientifically, but many found some traces of their existence in some countries, how about you, do you believe that?

learn more about the same events that occurred in several countries, many phenomena which revealed that the UFOs traces was found are man-made (an engineered only), so this news is also hard to believe, especially about the existence of life beyond earth creature, because until now there was no physical evidence to prove it.
jejak UFO,UFO
UFO trace - img2

as happens today in Sleman (Yogyakarta, Indonesia). Sleman residents were surprised by the discovery of traces of UFO in the middle of rice fields owned by a citizen, people who are surprised by phenomena that occur, in droves to go visit this place. though, to see the whole pattern they have to climb a high cliff nearly 100m, because the diameter of the pattern formed more than 60 meters. and only visible from the heights. but didn't dampen their desire to see it.
about pattern formed looks so neat, some experts Indonesia stated if this phenomenon is not caused by nature (eg: wind). but that doesn't mean it's not manmade. to investigate it, the local police have set up police lines to prevent damage to the area. and will check more about the phenomenon.

Unbelievable, but that's what has happened. or maybe this is just a joke
, UFO landed in the middle of rice fields .. ow! maybe they need rice to eat!? and maybe tomorrow they will land on the supermarket to steal the sausage and vegetables. what do you think?

Saturday, 22 January 2011

Safety Tips for Using Wi-Fi

Wi-Fi img 1
4 safety tips for using Wi-Fi
If you have a laptop computer with wireless connectivity, you can access the Internet using Wi-Fi, or wireless networks, often in public places such as coffee shops, airports, hotels, and other spaces.Here are four quick tips to enjoy the convenience of public Wi-Fi and help to protect your privacy.
1. Use a firewall 

If your computer uses Windows Vista or Windows XP and you've installed Service Pack 2, you have a built-in firewall that's turned on by default.You can configure Windows Firewall to provide better protection when you're using a public wireless network. For more information about windows firewall, click here
2. Hide your files 

When you use public Wi-Fi, and the network encryption is often out of your control.Check the privacy statement on the network's Web site to learn about the type of encryption they use.If you keep personal or financial information on your computer, consider investing in an operating system, such as Windows Vista, that includes the tools to protect your information through encryption. 
To learn more about Encrypt or decrypt click here
3. Don't type in credit card numbers or passwords 

These measures provide some protection against casual hackers and identity thieves who prey on wireless networks. But if criminals are determined enough, they will eventually find a way to get around any security system.If you want to be safe, avoid typing any sensitive information, such as your credit card number or any other financial information, while you use a public wireless network.

Notes : If you must enter credit card numbers while using a public wireless network, make sure there is a locked padlock icon at the bottom right corner of the browser window, and make sure the Web address begins with https: (the "s" stands for secure).
4. Turn off your wireless network when you're not using it 

If you're not surfing the Internet or sending e-mail, but still using your computer in an area where there is a public wireless network, disable your wireless connection.
If you're using an external Wi-Fi card you can remove it. 
If you're using an internal WiFi card, right-click the connection and click Disable.

~ to your blogging success ~

Tuesday, 18 January 2011

BlackBerry's Internal Memory Management Tips

BlackBerry img 2
Although we know the BlackBerry is a Smartphone, but, it doesn't mean, all advanced mobile phones are always perfect.. in fact, behind the sophistication, The BlackBerry have weaknesses that could disrupt our comfort when we use it, one of the drawback is, we can't save the applications that we install into a media card that is available in it. However, the applications that installed, will be stored into internal memory. of course it can reduce the internal memory capacity of your blackberry. for that reason, this time I try to share some tips on How to Manage your BlackBerry Internal Memory 
Synchronize phone

Synchronize phone
most blackberry users have forgotten something. when they open emails or attachments using their BlackBerry. in fact, it can improve memory usage that is not too important. let me tell you, if you want to open email or attachments on your BlackBerry, it would be better if you opened by using a PC (Personal Computer), of course, after you synchronize your blackberry to your PC. it will reduce the use of your BlackBerry's internal memory.

Browser Cache 
try to always clean up the browser cache. because it not only can reduce the memory capacity of your phone, but it can also slow down the speed access of your phone. and to remove it, just follow these steps: open a browser, then click on the menu (BlackBerry logo), next click option, then click on cache operations, and final, click clear history

Facebook cache
Don't ever think, facebook will not reduce your internal memory capacity, we must be observant for the use of any application, especially for social networking. to clear your the facebook cache, you can login to your facebook, then click on the menu, and click options, and final, click clear cache.

BlackBerry img1
Call history
You have to manage calls on your phone, although it is trivial, but the call history has a role to reduce the internal memory capacity of your phone. if you want to delete it from your phone, you can do this: open "message", click menu, click the folder view, click the missed calls, and click delete prior. , or open the "message", click menu, click on the folder view, click a phone call logs, click the menu, and final, click delete prior

Event log
Not only call history, but you need to pay attention to the event log. because this feature can also reduce your internal memory capacity, the steps to remove the log event are : from the main screen, click the alt key, hold briefly, and then click the letter "L, G, L, G"then press the menu (BlackBerry's logo).     and click the log clear.

Temp memory
Always clean up temp memory, do it by clicking the option, then click cleanning memory, then click the menu, click clean now, and then click save.

Soft reset
You can manage your memory by doing a soft reset, do this at least once every day, the easiest way to do a soft reset by pressing the ALT-SHIFT (Aa) RIGHT - DEL simultaneously. hold it until the screen off, and do not forget to do "HARD RESET" at least once in 3 days by removing the battery to refresh your BlackBerry.

-  hopefully useful -

Other BlackBerry tips:

Application for moslem
Compress Photo
Free Download BlackBerry Applications


Saturday, 15 January 2011

Free Download BlackBerry Application

Blackberry img1
If this is your first time using a BlackBerry, and you still don't know how to download the applications for your blackberry? don't worry, because I'll tell you, all of the best sites for your convenience to download BlackBerry application, you can't wait to find out ! Well, you'll get it right now. I recomanded you, to visit :

1. Google mobile
there's the one doesn't know google? of course,everyone knows google, this site can't only be used for browsing. Actually, this site also provides a free applications download service for BlackBerry users. please visit this link, http://www.google.com/apps/intl/business/mobile.html. and get what you need for your blackberry.

2. Getjar.com
Everyone knows Getjar is the biggest download site that ever existed, there were 200 thousand developers joined in it. and they are ready to give you a complete service with a simple search field, This website also has a variety of services, and getjat is capable of supporting: Java, Symbian, Windows Mobile applications , Palm and Blackberry. visit this site and get any application you need.

3. Opera Mini Browser
there is a uniqueness if you install this application. because you will see different colors on the display of your browser. although the theme used tend to be dark, but it still looks cool, and still help you when you surf. In addition, you shouldn't hesitate with the ability and speed of this application if installed on BlacBerry. This is an application that you need, install now and you don't have to wait too long to load

4. lobobrowser.org
This site is suitable for users of Java applications, because almost all the browsers in it are based on java applications. the advantage of this application if you install into your BlackBerry is.
- Fast browsing.
- Rich in features and more complete.
so, please visit this site for donwload your blackberry application.

5. Cyberiapc.com
if you're a reliable IT, surely you're very familiar with this website address. this site may be more familiar as a site that can help you to solve your PC problems, actually, there are some interesting application in this site. such as, the availability of thousands of free games based on java. visit this site and you no need to long to search the games application for your belackberry

That's them, some sites you can visit to download the application for your blackberry. I hope this information can be useful for you.

Other BlackBerry tips
Application for moslem
Compress Photo
Internal memory management

Tuesday, 11 January 2011

how to do online promotion to increase the traffic to your blog.

So many seo trics we can do to increase traffic to our blog, One of them is, by doing an online promotion. This trick is often done by the bloggers to increase traffic on their blogs.

a very simple thing to do, but carry a big impact on traffic increases and the popularity of a blog on the internet. If you haven't already to do it for your blog, I think you should do it now, because it is more important than you are installing a lot of meta tags in your blogger.

I have written some tips for doing online promotion for your blog, please read it and I suggest, you do it immediately, thereafter.

  1. Do, walkblogging, always leave a good comment and include your link after you read a post, when you visit other sites on the Internet
  2. If on the web that you visit has a guest book, would be better, if you fill the guest book, and leave your link
  3. When you buy an online product, I recomend you to fill out the testimonials of those products, so that every visitor who saw the same website, indirectly they will see a link from your web.
  4. Follow, at least 2 forums, and active in providing posts on the forum and include your link every time you write a post or comment
  5. Follow, social networking sites, such as : facebook, twiteer, etc., and create your own community, include your link every time you write a post and when you give a comment.
  6. Register your blog into a web directory service.

Well, now you already know what should you do, to do online promotion to increase traffic to your blog.good luck

- to your blogging success -

Related link :

- What is seo
- What is alexa

Friday, 7 January 2011


Meta tags are a means to convey all important information about the web pages to search engines. so many types of meta tags but there are only 3(three) meta tags are often used, they include:

- Description Tags, 
- keywords Tags , and 
- Meta robots.

                                Description Tags
Keyword search
Description Tag is created to provide an overview of the contents of web pages. The text you want to be shown as your description goes between the quotation marks after the "content=" portion of the tag (generally, 200 to 250 characters may be indexed, though only a smaller portion of this amount may be displayed). Examples of writing meta tag description is as follows:

<meta name="description" content =,"All about
blogger, seo,  computers and technology ">

Some search engines like Northern Light, and Google doesn't use meta tags as a description of its search results. What they use is the beginning of sentences which exist on the page.
 I recommend that you use the contents of the meta tag description as the opening sentence.

Keyword Tags
Keyword Tags or keyword search, also called keywords, so keywords that you create a benchmark for the search engines find your web pages.
Basic syntax written of the keyword tag is :

<meta name="keywords" content="keyword1 KEYWORD2 keyword3 ...">
or there is also a write with a comma separator:

<meta name="keywords" content="keyword1, keyword2, keyword3, ...>

Both of them are same and there is no influence on search engines. The purpose of the use of a comma on keywords tag, for keywords are easier to read. but don't you ever repeat the same word more than 3 times,

because it will be considered spamming.  

an example of the wrong keyword tag.
<meta name="keywords" content="Blog, Blogging, walkblogger, blogger template, bloggingly>
In the example above, we do find the word "blog" is repeated 5 times, that will be considered spamming.
Remember, the keywords you use, it should be relate to the content of your web pages. because if isn't, that will be considered spamming too.

Meta Robots
The main purpose of the use of meta robots is to determine which web pages can be indexed by spiders.These tags are very useful especially when a website uses frames for navigation. Of course we don't want the menus in the frame to be read by search engines.The basic format of the meta tag robots are as follows:
<meta name="robots" content="index | noindex | follow | nofollow">

For example, if you want the spiders to read the main page, and browse through all links that exist then add the following:
<meta name="robots" content="index follow">

With this command, the spider will index your main page and schedule to index the other pages that can be searched via a hyperlink (<a href="">).
The following command will instruct spiders not to index and browse the links on a web page.
<meta name="robots" content="noindex nofollow">

that's all I know about, how to use the tags in blogger. I hope a little explanation that I wrote in this post, may be useful for you
~ to your blogging sucess ~

related link :



Blog Directory

Technology Blogs
Technology online List of top Technology Blogs
OnToplist is optimized by SEO
Add blog to our blog directory. Page Rank Check


  © Blogger templates Newspaper III by Ourblogtemplates.com 2008

Back to TOP