Water Car Technology: The new way for better mileage

Climate change has received global attention due to the dangers it poses not only on future generation, but also on current generation. Global warming has been discussed and solution being sort at regional and international level. It is the subject on international and local newspaper, science journals, radio and televisions, social media such as Facebook and twitter.

World leaders have converged series of conferences to address the issue and signed treaties (for example, Kyoto protocol) to curb pollution and subsequently global warming and climate change. Of recent and more sustainable way to address the issue is development of water powered vehicles.

Water powered vehicle are thought to be the way out in solving energy crisis around the globe, for example, due to fuel shortage in 2008, many countries faced economic turmoil and most of automotive industry realised low profit. Use of water is forthcoming in solving such problems since water is readily available; in fact it covers 70% of the universe.

 Power Production

Water is made up of three atoms, two hydrogen atoms and one oxygen atom, which are bound by hydrogen bonds. Through electrolysis process, bonds are broken and the molecule separates to yield hydrogen molecules and oxygen.

With most of water powered engines, it uses membrane electrode assembly (MEA) to split water molecule. The engine needs to be supplied with air and water to function. Hydrogen produced is used to power engine, while the by product is water vapour and is released to the atmosphere. Water vapour is pollutant free.

Advantages of water as source of power

Water is readily available, in most cases, water is in excess. Water engines can solve the problem of high fuel prices especially to users of gasoline powered machines. Oil prices are sky rocketing each day with some people particularly in developing world and sub-Saharan Africa in particular, almost not able to buy gasoline fuel. In some countries, a litre of gasoline is more expensive than daily earning, this is more pronounced to unemployed individuals.

More powerful- scientist have proved beyond doubt that water powered engines are more powerful than gasoline, in fact; water is 2.5 more powerful than gasoline fuel. It can be used to run heavy machines and vehicles.

More environmental friendly

Gasoline produces some greenhouse gases such as carbon dioxide. This is the major cause of global warming and climate change evident in many parts of the world, for example, the rising of ocean level such as Atlantic Ocean and Indian Ocean, Hurricane such as Katrina in 2005 that left many people dead and damaged a lot of property in US. Such occurrence can be alleviated by use of water engine fuel because use of gasoline engines is among the major cause of environmental pollution.

Boosting developing countries economy- though developed countries are major pollutant, it is unfortunate because developing countries suffer more, for instance, most African countries rely on agriculture as the main source of capital and foreign exchange. Slight adverse change in environment will cost them more due to the fragile nature of the economy, use of water powered vehicle will result into reliable agriculture in these countries because the weather will be more predictable, furthermore, this will reduce death rate in these countries because disaster management and mitigation measures will be put in place.

Save the non-renewable sources of energy, this will help to curb depleting non-renewable energy sources. It is good to keep yourself posted on current issues in automotive industry, and you can contact DVLA contact number for more information on water powered vehicle.


Firefox Gecko Engine: What’s behind your browser?

It is widely acknowledged that the rendering engine is the most critical in the experience provided by a web browser. If you have been watching the development scene closely, you would have definitely heard about the current buzzword on the horizon, “WebKit” – which powers Apple’s Safari browser and Google’s Chrome browser. Now for a general idea, we narrow down the workings of Gecko and WebKit to two distinct points – the process architecture and extensibility.

The Gecko process architecture is such that it handles all of the concurrent tabs on a single process thread. While this results in a comparatively slower interface, in the long term, it pays off to not fork a new process for every little task that needs to be accomplished – the model commonly used under the WebKit architecture. What this means is that while the first few tabs with WebKit would seem faster, it’s because the engine is only utilizing a few extra resources from the computer to parallelize the work and bring with it the overhead involved, but when you go up to double digits in tabs opened, with some of them doing resources-intensive work, such as playing videos or working with comprehensive web-apps, this model returns to cripple the overall performance of the system, and by the extension, of the browser itself, due to the sheer number of the processes that are now being requested to be forked and maintained by the system.

Firefox, as has often been cited, tends to do much better at handling such high pressure loads, because the entire browser’s working are restricted to a single thread, which is much more maintainable at a system level. The difference in the memory footprint increases almost exponentially between the two, as we make our workings more and more resources intensive.

Then, there’s the concern about online privacy. Although not directly relevant to the browser engines, it is worth noting that due to Firefox not being tied into any particular ecosystem, it offers an unparalleled sense of security due to an absolute lack of conflict of interests. The ‘Firefox Sync’ feature remains one step ahead of the usual username/password combination, and provides an encryption key that is stored locally on your device, which, when passed on to a new installation of Firefox, provides your data to you remotely, via Firefox Servers, with nobody else being able to peek at the exact information. Also, Firefox pioneers the campaign to hamper the ability of online commodities to track the actions of users via a combination of IP address re-routing, and blocking other user-identifiable data. This has been reflected in the aftermath of the recent NSA-spying revelations by Edward Snowden, with users responding by exponentially increasing their downloads on non-conglomerate entities such as Firefox and Opera.

Of course, there will be entities who believe that this can be used for illegal activities, but then again, so can regular phone call.

Beta Inkless Pen : Write without ink

inklessImagine getting your hands on a pen or pencil that doesn’t rely on timber, ink or graphite and is therefore more eco-sensitive than any pencil you’ve ever used? Well, that’s exactly what the Beta Inkless Pen is. It has a lead tip and feels heavier than most pen or pencils that you might have used, so getting used to it is tricky. It’s design is the revival of an age old artist technique of writing in metal! The tiny metal tip is made of lead (so do not put it in your mouth) and will write notes forever. However, with an optional anodized aluminum or cherry wood exterior, this is not just a pen but one hack of a style statement. The pen leaves a grey imprint when scribbled on paper and needs no refill as – get this- it has no ink. Fancy writing with a streak of pure oozing metal anyone?


Use it and you will stop contributing to the grinding away of trees by sharpening away wood pencils.  The Beta Inkless Pen will be your favorite writing instrument.  Use it for a new experience.  It lays down a grey line that doesn’t smudge or erase. It never needs sharpening and doesn’t run out. The shaft of the pen is available in anodized aluminum which is cool to the touch. If you prefer a warm and an airy feel, select the cherry wood finish.

The pens can be used on most paper surfaces, at any temperature or in any weather condition and will never need to be sharpened.  In actuality, writing with lead is pretty unique, as is the Inkless Metal Pen, which sheds minute particles of lead as you write. How minute? The Inkless Metal Pen works so well that it will pretty much never need sharpening or a refill, and it’s “ink” is also solid, so you never need to worry about it exploding like a pulverized squid in your pants pocket. It doesn’t smudge either.

Features & specs:

  • Dimensions (standard – silver, black, or cherry): 6.25″ x 0.375″ diameter
  • Dimensions (keychain): 2.25″ x 0.375″ diameter
  • Special alloy metal tip
  • Anodized aluminum or cherry wood barrel
  • No dulling, no smudging, no leaking, no refills
  • Warning: Not intended for children (due to small amounts of lead in the tip)
  • Keychain version includes a metal gift tin and keyring

 There’s no way I’d switch to a Beta Pen as my main writing instrument (I’ll use Uni-Ball pens until my stockpile runs dry), but it’s a nice go-to pen to throw in a bag or even on a key-ring for unexpected note-taking, when you don’t want to worry about sharpening a pencil or running out of pen ink while on the go.

Does your machine behaving weird these days?

Keep in mind that a combination of symptoms is much more likely proof that you’re infected: rarely does a virus have just one effect. That said, here’s a checklist of what to look out for before you press the almighty Scan button on your anti-virus (if the virus hasn’t already disabled it!).


    1. 0Your computer takes charge and does things on its own—moving the mouse cursor all by itself, randomly closing and opening windows, showing you messages that say “We’ve got you!” and so forth. If any of this is happening, we don’t even need to tell you that you’re infected!
    2. 1Your computer often stops responding. This is more so a sign of an infection with Windows 7 than with earlier versions: Windows 98 used to stop responding often even without infection, so that doesn’t mean much!
    3. 2The crashes-and-restarts-on-its own syndrome: this is a pretty good indicator of viral activity on your computer. Of course, it could be something else, but if this is happening and your antivirus is working, why not do a scan anyway?
    4. 3Several apps seem broken. The key word here is “several”: one program not working correctly, like we said, is seldom an indicator of a virus. But if you notice functional anomalies in several applications, it’s time to scan.
    5. 4Certain drives on your computer have suddenly become inaccessible, even though they show up in My Computer.


    1. 5Not being able to print correctly has been stated as an indicator of a viral infection, but don’t panic if you get a bad printout. It’s probably due to something else. But if it happens in conjunction with other symptoms…
    2. 6Unexpected error messages with weird codes! Of course, error messages are seldom user-friendly, so the key here is how often they pop up, and how weird they are. For example, a big red cross and an OK button that doesn’t say “OK”.
    3. 7Now this is so typical of possible viral infection that we hardly need to mention it: distorted dialog boxes and menus. Hit “Scan” immediately. And if it turns out not to have been a virus, there’s still something wrong with your computer, so have it checked.
    4. 8If, despite all our warnings in the past five years, you still opened a suspicious-looking attachment—driven, of course, by what is called the libido—and immediately after that, everything (or at least some things) went funny, you’re in for it. Hit Scan. And hope that the anti-virus will scan.
    5. 9It could be that your anti-virus needs a re-install, but it’s unlikely: if the anti-virus is disabled and you didn’t disable it, you’re very likely infected. Before panicking, first try reinstalling the antivirus. If that doesn’t work, panic.
    6. 10Continuing along those dire lines, if you’re able to install any program but an anti-virus, then yes, you are a victim.


    1. 11When someone tells you he or she got an infected message from you, you almost certainly have something bad on your computer. It might or might not be a virus.


    1. 12A not-so-common symptom, but a deadly giveaway, is the mouse pointer changing to something else. Of course, if you went to one of those “1000 cursors free!” sites and downloaded and installed cursors, then you’re infected by spyware anyway.
    2. 13Icons on the desktop that you didn’t place are again a giveaway symptom.


    1. 14Unnecessary shortcuts have been created of files and folders that don’t even needed.


  1. 15You cannot see anything in a folder or drive but it is still occupying memory space. Best solution to try is Go to Organize > Folder and Search Option > View and Unmark – Hide Protected System files, also – Select Show hidden files and folders. Most of the time you will get your hidden files through this.
  2. 16If you just installed a program—successfully—and it doesn’t work properly, or if its icons have vanished, don’t reinstall it! There’s no time to waste—quickly do a scan.
  3. 17Now this could also be an indicator of spyware, but when you notice that your modem is doing a lot of activity on its own—both sending and receiving—or if your hard disk is performing more activity than you’d expect, like chattering away when you’re not even working on anything, it could be a sign of viral infection.

Then there’s the System Configuration Utility, activated by typing in “msconfig” at a command prompt. Run it and take a good, hard look at all the programs running. If you see something with random character strings as its name… you’ve guessed it: you’re infected by either a virus or spyware. But most viruses and spyware don’t give themselves away so easily, and call themselves by decent names.

One thing to remember is that slow behavior could also be due to spyware, and it doesn’t necessarily mean a virus. Of course, it could be nothing at all, and all in your head.

You need to decide on what “slow” and “odd” mean. First off, whatever your machine, you know when it’s running slower than usual, and when that happens, there’s a possibility that you’re infected. Windows pop up more slowly. Random activity seems to be happening in the background more often than it should. Something negative seems to have happened to the overall responsiveness of the system.

How to: Add custom icon on Removable Drive

Did You Notice, whenever you insert a game CD/DVD, an icon is used over the drive. By default windows will put a simple Disk image over it. Game developers and software designers generally use their company logo to show off some style.

You can also do this simply to your Removable Drive (Pen Drive, CD and DVD). Most of the people must have seen an “autorun.inf” file inside CD/DVDs. This file is responsible for automatically executing application or start setup when the disk is inserted. This file is also capable of adding custom icon to it. For this:

1) Open Microsoft Notepad or any other text editor.

2) Write the following code in it:


3) Now save it but not with a .txt file extension, name it as “autorun.inf”. Make sure you set extension right.


4) Simply copy this file and icon file to root of your Removable Drive.


Remember! The “your_icon_name” MUST be replaced with the name of icon file. You can use icons embedded in a *.dll file by placing the dll file under the icon tag, and then index it.

Eg: icon=”shell32.dll, 5”

Bitmap (*.bmp) files are also supported for this action (but not recommended). There are some other tags that can be used other than icon in autorun.inf file, like: label, open, action. We will discuss rest in some other articles.

Some new features for Google Maps

Google recently unveiled a huge makeover to its Google Maps. Currently available in beta mode, it lets you discover changes in its interface and improved accessibilities. However, the search results in this version remain more or less the same as in the earlier version. You’ll find some changes in the form of search inputs and queries. Unlike the older version of Google Maps, it has a bunch of new and improved functionalities such as advanced filters for search queries.

Search on the Google Maps

Let’s say you’re looking for coffee shops near Delhi’s Qutub Minar, you can use the term “near” in your search query. Therefore, the most appropriate search query would be “coffee near Qutub Minar”. In the results you’ll be shown all the coffee shops located around this area. You can do the same for other similar search queries.

Instantly share URLs

Whenever you want to share the URL of a particular map, all you have to do is click a button called “link” on the older version of Google Maps. The new Google Maps will allow you to always have a permalink of any place you search for. Whenever you search for any location, you’ll find its URL present inside the address bar, ready to be retrieved and shared instantly with you others.


Get offline Google Maps

If there are particular locations on Google Maps that you’re fond of, you don’t need to be online and connected to access them each time. You can simply make them appear offline for later use. While you’re online, go to the Google Maps application on your phone and open the map. In the search box, you’ll find search suggestions for recently accessed places. Select “Make this map area available offline” and you are done. You can also use menu button and select this option, a square box will pop up and highlight the area of map you want to download.

Note: This feature is currently available only on Android Devices.

Access Street View

Similar to Google Maps on desktop, there’s no longer an option on mobile devices to access Street View as soon as search results show up. If you want Street View of a particular location on Google Maps, simply press and hold on the map to drop a pin. This will render an info sheet, which lets you access the Street View option.

Camera Keywords Explained

Have you always been fascinated by photography but found the whole thing to be a little too daunting? Have you always been “clicking an auto” but want to learn the finer details of functions? Well, worry not as we’re going to simplify all the technical keywords that comes with having to operate a camera, so that all you have to do is dial in the settings and shoot.

aperture camera


Aperture: Aperture is the term that refers to a circular curtain inside the lens which determines just how much light goes into your camera. An aperture values signifies just how much the curtain opens and is measured in fractions. Therefore, a bigger fraction denoted a bigger opening, eg. ½ is bigger than 1/16. The larger the aperture opens, the more light hits your sensor. Therefore to shoot in low light, a big aperture is a must.

Shutterspeed: Once the light has crossed the aperture, it sort of just sits inside your camera before hitting the sensor. What’s blocking it is another curtain called shutter. The shutter decides for how long all this light that has entered your camera will hit the sensor. Allow it too much time and your image will start turning white and allow it too little time and it will be too dark. The duration for which the shutter is open is measured in fractions as well, unless you are doing a long exposure of several secs/mins/hours.

ISO: The ISO on your camera determines just how sensitive your sensor is to light. The higher the ISO, the more sensitive it is, meaning it needs lesser light to create an image. This, however, does not mean that you can crank the ISO setting all the way to the highest, as there are a few downsides to using High ISO.

Light Meter: A light meter is a little module that measures the amount of light coming into camera and factors all the conditions to generate a “good” exposure based on preset parameters. This is what tells you how much shutter speed and aperture values to use. Unfortunately, the light meter is not always a 100% accurate, so always review your images after shooting and if they look over or under exposed, do use exposure compensation.

Exposure Compensation

By Kathy Eyster

Exposure Compensation: Exposure compensation is the method where you expose a little longer or for a shorter duration than what your light meter says should be the right setting. This can occur when you shoot at the light meter recommended settings and your exposure Is either over or under exposure. So you can do positive exposure compensation (to increase exposure) or use negative exposure compensation (to underexpose). You’d ideally use exposure compensation as a quick fix to your exposure problems, without having to change the shutter speed or aperture.

Depth of Field: The Depth of Field (DoF) of a particular photograph essentially refers to the area in front and behind your intended point of focus. The more the depth of field, the more you will have in focus in your image and smaller the depth of field, the more background (and foreground) blur you will get. Macro shots tend to have a “shallow” depth of field, while group shots must have a great depth of field.

Bracketing Shots: Bracketing is a method where the camera can take a number of shots simultaneously at different exposure values. Normally, this would be a “0” exposure (the value determined by your light meter as ideal) and two (or more even numbered shots) more with an exposure value of a higher and an equally lower value. This is an extremely handy method for shoot High Dynamic Range images.   If you are going to buy a new camera device, than don’t forget to check these point of concern that you should keep in mind.