Logo Allmyblog
Logo Allmyblog
Lien de l'article    

DOVENDOSI

Batteries d’ordinateur portable Asus | Replacement batterie pour Asus - batterie-portable-asus.com
Contacter l'auteur de ce blog

5 DERNIERS ARTICLES
- Battery for Lenovo IdeaPad S10-3 0647-29U
- Battery for Dell Latitude E5530
- Battery for Samsung AA-PB2NX6W
- Batterie pour ASUS A31-B43
- Akku für Dell Latitude E5420 ATG
Sommaire

CALENDRIER
LunMarMerJeuVenSamDim
010203040506
07080910111213
14151617181920
21222324252627
28293031
<< Août >>

BLOGS FAVORIS
Ajouter dovendosi à vos favoris
 Battery for Dell 0J70W7 Alerter l'administrateur Recommander à un ami Lien de l'article 

Delegates at these cons are a mix of professional penetration testers and security admins, hackers of dubious history, curious developers, and students. Some of those attending are partly responsible for defending the nation’s biggest and most important companies.Most of these volunteer-run and continually sold-out events cost between A$50 and A$150, with some occasionally free for the most broke hacker, and are home to a staple of community-run lockpick and capture the flag competitions lasting what is a typically two-day conference.After an arguable decade of hiatus, the cheap grassroots cons have spread out to cover almost all Australian states. Hackers have WAHCKON in Perth, CrikeyCon in Brisbane, Platypuscon in Sydney, BSides in Canberra, Unrest in Melbourne, and regional pillar Kiwicon in Wellington.These could not be further from the typical C-level security event where ticket prices demand up to A$2000, technical talks are scarce, and vendor booths and pressed suits are as prolific as branded backpacks.BSides Canberra, held on the shoulder of the Government’s large defence sector-orientated Australian Cyber Security Conference (ACSC), concluded its second and last day to a standing ovation. The $50 hacker meet run by security pair Silvio Cesare and Kylie McDevitt sold out quickly. “There are many reasons we started BSides Canberra,” co-organiser Cesare says. “We wanted to provide a local conference for Canberra at which we could inspire the next generation of hackers.”

The popular pair have a focus on encouraging new blood into the security sector at large, and more specifically into the conference circuit to consume and present new research. To that end they have kept the ticket prices rock bottom to ensure it is accessible to anyone interested in the field.Sponsorship from community-centric security firms means the conference breaks even, throws two open-bar parties, and gives each of the 360 delegates a custom t-shirt and home-made Arduino badge that displays the conference running order. Says Cesare: “… we think there will be people at corporate conference that will go nowhere near a hackercon and vice versa but there will also be an overlap,” Cesare says. “We don’t make a profit … this is just our passion.”Highlights of the con include auctioning nasty Oracle zeroday flaws – one written on a napkin – to fund a ‘steak dinner’ for the organisers, a “nail-biting” capture the flag competition decided in the last four minutes, and some delegate badge re-tweaking. Who: A stable core 'Crüe' of Bogan, Pipes (retired), metlstorm, Sharrow, Ad, Vex, Madman, Squirrelboy, and Lisa, along with a retinue of volunteers who make the ship sail, and SiteHost who host the con's web presence gratis.Kiwicon celebrates its tenth year in November and is placed at the top of many Aussie and Kiwi hacker con wish lists. It has ballooned in size from a small gathering at a university campus building to outgrow Wellington's iconic Opera House and the St. James Theatre.

Local and overseas speakers come to offer technical strolls, highlight horrid holes in enterprise software and advice to improve delegates' exploitation prowess, and a litany of illustrations that paint the sorry state of information security. This all takes place against a backdrop of metal music and pyrotechnics. Attendees gain perspective on the event with the aid of local craft beer bearing Kiwicon insignia.The genesis was simple; if the Aussies can do it, surely we can? con organiser Metlstorm says. How hard can it be to get 80 people in a room, talk about computer hacking, then go to the pub? … From there Kiwicon just burgeoned into a monster that fundamentally is built in our own image of not taking ourselves very seriously.What is now more of a hacker themed variety show Kiwicon has become a slick entertaining production that balances showmanship with technical content that guarantees the expanded 2200 seats this year will again fill fast. The upcoming event will likely be the biggest antipodean security con, despite its banishment of the immortal trade event annoyances: vendor shillin', big money illin', no booth babes, no booths, no paid talks, no swag bags full of crap you're gonna throw out immediately, no bullshit, and of course the sticker shock of the ticket price, the respected penetration tester says.

Recent notable talks include William Turner's evisceration of then still-vulnerable Christchurch bus system, a feat which led to the then kid hacker winning 'most likely to be arrested' and, through subsequent bureaucratic hamfisting, led to admin credentials being disclosed in public freedom of information documents.Another year hacker Denis Andzakovic outfitted his Yamaha with a HUD and hardware to build a Wi-Fi war bike. At last year's con two hackers displayed equal measures of daring and showmanship when revealing algorithm flaws that allowed Kiwis to print their own non-expiring discount petrol coupons scanned at the pump. They even printed and successfully demonstrated the barcodes printed on teeshirts.Kiwicon is like all the community cons that followed it a manifestation of hacker imaginings. We built the con we wanted to go to; cheap, real, friendly and interesting, Metlstorm says. That probably excludes the national-security F35-lovin' conference crowd. Tradeshow events showcase the root cause of the problems in the infosec industry, Metlstorm says. We humbly aim to be the opposite.

The con bears a different theme each year which of late tend to mock the corporate technology world and the military industrial complex: 'it's always 1989 in computer security' chimed one 8-bit motif, while cyber-friends was painted on Kiwicon 7 as an answer to the vacuous cries of cyber war.Still, Kiwicon is an inclusive event and Meltstorm welcomes the errant military industrial tradeshow traveller: So, if the day comes when they're ready to accept empiricism into their cold dead hearts, after all their shit got owned via the security products they bought or sold, we'll be here still, actual practitioners doing the actual work that actually advances the state of the motherf**kin' art. Unrest is a brand spanking new security con set to hold the first of what history says will be many events in Melbourne's north. The hacker con is billed as an audiovisual experience which will eschew the traditional conference space along with its filter coffee, jerks in suits, and awful hors d'oeuvre for an unconventional audio-visual experience.The con with its fictitious Ministry of Unrest and Illuminati-esque iconography is home to promising technical and social engineering talks, workshops, and a chill-out art and gaming area.It is the brainchild of penetration tester, lockpicker, and hopeful comedian Wily. We wanted to do something different, he says. A non-traditional venue, no corporate sponsorship, low cost, and high impact.

Wily gives a nod to Ruxcon, the established but more pricer Melbourne hacker con that since 2003 has regularly sold out with technical talks and workshops. Ruxcon has been around in Australia since 2003, and has always brought together the Australian community, Wily says. Other community hacker conferences have sprung up around the country, and there is certainly room for more of these events.There is, Wily says, space for both the pricer cons such as the recently held AusCERT corporate conference in Queensland's Gold Coast, and the more expensive Syscan technical hacker con in Singapore, and the grassroots community events.But without the big ticket price tag, Wily is merely aiming to break even: We are hoping to break even, and if we're lucky we might, he says. When asked by Vulture South if he and his fellow con organisers 'hate money', the hacker sums up their collective commitment to community: we are a bunch of overpaid infosec jerks. This Sydney startup con is a hands-on hacker meet where the policy is show up with a laptop or not at all. Co-organiser lin_s has, with a little help from his friends, developed a conference that emphasises practical hacker experimentation. “We started the con and our community (Just Hack Shit) on the basis that we wanted to see something different from the traditional security content of just speakers talking at the audience,” she says. “We wanted to build a group where people from all walks of life could come and do infosec nerd stuff on the proviso that they had to participate.”

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 11-08-2017 à 06h01

 Battery for Toshiba Satellite P775 Alerter l'administrateur Recommander à un ami Lien de l'article 

It is a popular and unique concept born of a night spent on the museum lawns in Sydney’s Circular Quay where lin_s and her friends got together to hack in a capture the flag competition. Total cost was munchies and beer. It turns out lots of people were interested in this kind of thing - we couldn't find anything similar already, so we built something ourselves. Now in its fourth year, WAHCKon remains Perth's first and only hacker con home to a repeat solid line-up of security talks ranging from the technical to the absurd. For the former, speakers this year detailed the security chops of Docker, the perils of SSL, and PHP malware debriding. The latter was catered by the opening talk given by WAHCKon organisers who took delegates on a journey into the skulking malware PC assistant known as Bonzi Buddy who was this year's mascot.These (grassroots cons) are absolutely a thing now, and we're continually hearing about new cons starting all over Australia, Kronicd says. When we began there really wasn't anything of the sort.

The Perth confab was fired up to bridge the 4000 kilometre void between Perth and Australia's big east coast cities. Western Australia is pretty isolated from the community, and we saw that it just wasn't possible for a lot of less established hackers to attend existing hacker cons due to the prohibitive cost of travel and lack of corporate sponsorship, he says. WAHCKon 3 this year. Image: Darren Pauli He also misses the casual vibe of bygone Aussie hacker cons, and so sought with colleagues to build the conference they wanted to attend. The scene in Australia had become extremely corporate, and we wanted a return to the hacker cons we remembered -- we wanted to bring together the WA hacker community and to ensure that everyone had a chance to attend. To this end, organisers are willing to hand out free tickets to those who can't afford the $60 face price.Kronicd like his kin beg each year for their complicated conferences to come to an end, but persistent popularity serves as a defibrillator: Honestly, we've wanted this to stop for years. We're tired. People keep showing up and incredible speakers keep submitting talks. It really isn't up to us anymore.

Who: Wade Alcorn, Scotty Brown, Robert Winkel, Glyn Geoghegan, Gary Gaskell, Ashley Deuble, Anne Luk.CrikeyCon is another community-led charitable not-for-profit con based in Australia's Sunshine State that offers a diverse range of security talks and capture the flag and lock picking events over a day and a half. Co-founder Wade Alcorn says the concept was found at the bottom of a beer glass in a Brisbane pub.Crikey was born over a few beers between mates in Brisbane lamenting the lack of a local con, Alcorn says. We wanted to give something back to the security community that's been great to all of us … and create a local event where people can share, learn and socialise with like-minded enthusiasts.The crew expected the first event to host numbers resembling a large night out, but instead 60 hackers turned up, with 150 attending cons soon after. This year pulled 250.Those punters are a mix of hackers and business infosec types both of whom Alcorn credits with sufficient olfactory sense to sniff out the good cons from the bad. True security nerds try to get to as many things as they can that they get value from - even if it is on their own time, he says.

Wellington is one of the windiest cities in the world. Pilots aborting landings at New Zealand's capital have the Cook Strait – the chasm between mountain ranges running the length of the North and South Islands - to thank. Delegates to Wrong Island Con thank the Cook Strait for similar reasons.The conference in its third year in 2016 was born of a bad situation, and pretty well typifies the impromptu larrikinism of the antipodean hacker scene. Wrong Island Con was basically an in joke that got horribly out of hand, lone con organiser Richo says. He explains how hackers en route to Kiwicon 7 in the dying months of 2013 were diverted from Wellington to Auckland on account of severe weather.Three plane loads of Australian binary breakers ended up on the South island, cloistered in the body of the plane for hours while staff refused to let them disembark. Cabin fever rose among the trapped hackers as they pledged to honour the occasion next year by holding a hacker con on the wrong island.Enough people convinced me that it was a really good idea that we actually had a Wrong Island Con the next year before Kiwicon 8, Richo says, adding thats the low-key con emphasises less is more with talks clipped to 20 minutes. There are exceptions; hacker Snare took the liberty to give an hour-long thesis on uefi, Richo recounts.

The security guy at a US tech company agrees that community cons are proliferating quickly. I think the tipping point was the realisation that basically any idiot can run one -- that's definitely how Wrong Island Con came about.Everyone pays the US$50 to attend, even the speakers, but Richo like others only hopes to cover costs. The community tends to dig deep, and indeed Vulture South has spoken to security companies that save their sponsor cash for grassroots cons, without expectations of returns. Richo started the first Wrong Island Con in Christchurch with no sponsors, and had signed up three by day's end. That was pretty humbling, he says. The former CEO of African regional internet registry Afrinic has apologized for claiming that there was a race-related conspiracy to take over the organization.Adiel Akplogan responded to his original email noting that he had intended it to be a private message. He then apologized to my many friends and colleagues globally who have supported and worked with me over the past 20+ years and who may have felt targeted by its content ... I hope you will not see in this private message anything malicious.

Akplogan stunned the internet community when he responded to concerns that if a certain board candidate was selected, it would mean there would be two members from the same company on the eight-person board.While some saw a corporate conspiracy, Akplogan claimed something else was afoot: It is in fact not about a particular company trying to take over, but a clear racial fight for the white to take over, he wrote.They have always claimed that we Black cannot run an organization like Afrinic.Akplogan clarified that the target of his race-related ire was not the prospective board candidate (who subsequently withdrew his bid), which suggests his outburst was aimed at existing (white) board member Andrew Alston. Alston has become unpopular with existing board members in part by pushing strongly for transparency reforms.While Akplogan apologized for his email being made public, he did not apologize for its contents. Even though I do not deny my frustration, I should have exercised a bit more control and not allowed it to burst publicly, he wrote. The Network Time Protocol (NTP) organisation pushed out a bunch of patches last Thursday, including one high-severity bug.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 12-08-2017 à 06h33

 Battery for HP ProBook 4540s Alerter l'administrateur Recommander à un ami Lien de l'article 

The vulnerabilities in question are CVE-2016-4957 (another vulnerability in Crypto-NAK found by Cisco), and from Red Hat there's CVE-2016-4953 (an authentication bug), CVE-2016-4954 (server packet spoofing), CVE-2016-4955 (autokey association reset) and CVE-2016-4956 (a broadcast interleave bug).This Damn War “What’s the smallest fire I could start to be noticed, but not so big that I risk burning down the building?” is one of the stranger thoughts to have entered my head, in many years of working in IT. No, I'm not a closet pyromaniac, so why was I entertaining such thoughts?I had found myself stuck in a data centre on a Sunday afternoon and by that point, I’d been in there for over two hours with no sign of rescue. That shouldn’t have been the case, of course, but a series of unfortunate events had led me down that road.The data centre in question was undergoing an enormous refurbishment, and the rack I was working on was one of the last stragglers in an aged hall that was waiting to be decommissioned. When I arrived, the on-site team were very conscientious in pointing out open floor tiles and various other construction-related trip hazards; unfortunately, the contractors had been rather less meticulous.

I completed the work I needed to, then packed up my bag to leave. When I got to the exit however, my access card wouldn’t unlock the door. After a few frustrated swipes I tried the emergency door release button, also to no avail. Following some rather pitiful shoulder bunts against the door, to see if the release was working but the door itself was physically stuck – it wasn’t, it hurt – I conceded that the contractors must have fouled up the access control system somehow.“Not a problem,” I thought to myself, and picked up the telephone on the wall adjacent to the door, normally a direct line through to the operations centre. The line was dead, another casualty of the building work.“Still nothing to worry about,” I mused, and started waving my arms in front of the CCTV camera above the door to get someone’s attention.I jumped around in front of that camera for far longer than I’d care to admit, before I resigned myself to the fact that nobody was watching (or rather, able to watch) and sat down on the floor to take stock of my options.I first reached for my mobile phone which was almost fully charged, but had no signal in the metal sarcophagus of the data centre’s innards. Next up was my laptop: I could grab a network cable, plug directly into the network switch in my rack, and contact the outside world to achieve my freedom. Unfortunately, that was my third stop of the day and I’d already worn my laptop’s meagre battery down… and the power supply was on my desk at home. There wasn’t even a KVM trolley in the hall to use one of our servers to call for help, another casualty of the decommissioning process.

Deflated, I sat on the floor, and wondered how long it would take for someone to notice I was gone. I hadn’t given my wife an ETA for arriving home and as far as my colleagues were concerned this was a “pop in on my way past” flying visit, so they wouldn’t be expecting to hear from me again. By this point, I’d been in there for well over an hour and nobody had been to check on me; I was starting to get worried.What got me really worried was when I couldn’t open the fire door at the back of the hall. I could depress the release bar, but there was some construction detritus behind the door that meant it simply wouldn’t budge. Cue more pathetic shoulder charging, to no avail.I hammered on the fire door for a while and shouted myself hoarse, but nobody heard, so I tried the main door. Shouting for help turned into profanities, which turned into pleading and plaintive wails, but no help was forthcoming.Again, I sat on the floor and stewed for a while, and by the two-hour mark I was starting to feel desperate, which probably explains the (admittedly, very poorly-thought out) ‘start a small fire’ plan; quickly shelved, when I realised the fire alarm didn’t go off when I tried the door.

As I began to contemplate a night in my personal air-conditioned hell, a thought occurred to me: the fire alarm might have been yet another casualty of building works, but it wasn’t the only kind of monitoring.I ran over to my rack and pulled a couple of redundant power cables; not serious enough for an outage, but enough to generate some alerts from our own monitoring. I replaced them and did the same with more servers – lather, rinse and repeat – until the constantly flapping monitors caused one of my team to ring the data centre, to ask them to eyeball our rack and check for ‘power problems’.All told, I’d been trapped in that data centre for less than three hours, but even so when that door did finally open I felt like Shawshank Redemption’s Andy Dufresne. Lenovo is warning users to uninstall its Accelerator support application after it was revealed to have what it says are serious interception vulnerabilities.The company is one of five vendors caught pre-installing dangerously-vulnerable OEM software.

Duo Security researcher Mikhail Davidov reported the holes that would allow eavesdropping attackers to tap into Accelerator's unencrypted update channels to compromise users."A vulnerability was identified in the Lenovo Accelerator Application software which could lead to exploitation by an attacker with man-in-the-middle capabilities," Lenovo says."The vulnerability resides within the update mechanism where a Lenovo server is queried to identify if application updates are available."Lenovo recommends customers uninstall Lenovo Accelerator Application."Unencrypted update channels open an avenue for attackers to among other efforts push malware masquerading as software patches. It is limited in that it requires affected users to connect to malicious or open wireless networks to be exposed.Only those Lenovo machines with Windows 10 pre-installed sport the exposed app.The Lenovo Accelerator Application is used to speed up the launch of Lenovo applications and was installed in some notebook and desktop systems preloaded with the Windows 10 operating system.

Laptops from Acer, Asus, Dell, and HP were also tested and found to have a dozen vulnerabilities. All contained at least one hijacking flaw, most of which are easy to exploit.Lenovo says some 46 notebook and 25 desktop lines are affected, including its top end Y700 gaming laptop, IdeaCentre all-in-one desktops, and Yoga flip netbooks.It follows the 2014 shelling of Lenovo after it bundled the Superfish adware which used a trusted root certification authority certificate that allowed attackers to spoof HTTPS traffic. AMD has officially torn the wraps off its seventh-generation processors for laptops and notebooks. These are, we're told, shipping in volume in gear from Acer, Asus, Dell, HP, and Lenovo.As warned in April, and announced today at Computex 2016 in Taipei, the CPUs use AMD's Excavator architecture as found in Carrizo.AMD's new “Bristol Ridge” seventh-gen family features 35W and 15W versions of AMD's FX, A12 and A10 processors, and the “Stoney Ridge” gang includes 15W A9, A6 and E2 chips. The list of Mini Chipzilla's seventh-gen CPUs is here.

Meanwhile, the $199 Radeon RX 480 graphics processor has popped up, powered by the Polaris architecture, and is aimed at VR geeks. Computers from many of the biggest PC makers are riddled with easy-to-exploit vulnerabilities in pre-loaded software, security researchers warn.The research from Duo Security shows that bloatware is not just a nuisance that causes a lag in system boot-up, but a security risk. Laptops from Acer, Asus, Dell, HP and Lenovo all have at least one security vulnerability that can lead to a full system compromise. Most of the vulnerabilities would be straightforward to exploit even for technically unsophisticated hackers, according to Duo Security.Lenovo copped an enormous amount of flack after it began bundling Superfish adware with some of its computers in September 2014. Superfish adware was installed on some Lenovo PCs with a trusted root certification authority (CA) certificate, allowing an attacker to spoof HTTPS traffic.A machine with Superfish VisualDiscovery installed will be vulnerable to SSL spoofing attacks without a warning from the browser, as US CERT warned around the time the scandal broke in early 2015.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 12-08-2017 à 06h40

 Akku für HP Compaq HSTNN-DB11 Alerter l'administrateur Recommander à un ami Lien de l'article 

Sion heißt das Elektrofahrzeug des Münchner Start-up-Unternehmens Sono Motors. Das Besondere daran: Am Fahrzeug angebrachte Solarzellen laden die Batterie. Insgesamt 330 Solarzellen verbaute das Unternehmen in die Karosserie des Sion. Heckklappe, Motorhaube, Dach sowie Türen sind mit Zellen bedeckt, die wiederum mit einer Schicht aus Polycarbonat überzogen sind.

Der Sion von Sono Motors ist mit Solarzellen bedeckt.
Zum Schutz vor schädlichen Umwelteinflüssen sind die Solarzellen in eine Schicht Polycarbonat eingebettet.
Sono Motors
Sowohl im Stand als auch während der Fahrt können die Solarzellen so die Batterie aufladen, wodurch das Fahrzeug laut Unternehmen bis zu 30 km pro Tag mehr zurücklegen kann. Insgesamt kommt man im Viersitzer bei voller Batterie rund 250 km weit. Zusätzlich lässt sich die Batterie mittels eines bidirektionalen Ladegeräts sowohl über das konventionelle Stromnetzt laden als auch unabhängige Stromquelle nutzen. So können beispielsweise kleine elektronische Geräte mit bis zu 2,7 kw Energie versorgt oder sogar andere Elektroautos über einen Typ-2-Stecker mit 7,6 kW geladen werden.

Rund 16.000 Euro soll der Sion kosten, jedoch müssen Käufer sich dann entscheiden, ob sie die Batterie für zusätzliche 4000 Euro kaufen oder für einen noch nicht spezifizierten Preis mieten. Zu den Features des Autos zählen auch eine Smartphone-App und Mobilitätsservices. Die App ermöglicht es, so die Idee der Entwickler, den Sion mit anderen Menschen zu teilen (Carsharing) oder Powersharing zu betreiben, also Energie aus der Batterie anbieten. Zusätzlich können Besitzer des Sions Mitfahrgelegenheiten anbieten (Ridesharing).

Gegründet wurde Sono Motors im Januar 2016. Zur Finanzierung ihrer Idee startete das Unternehmen im Juli 2016 eine Crowdfunding-Kampagne und sammelte so bis September 2016 über 700.000 Euro zur Umsetzung ihres Elektrofahrzeugs. In verschiedenen Städten bietet Sono Motors ab Mitte August Probefahrten an. Die Serienproduktion soll dann im zweiten Quartal 2019 beginnen, sofern 5000 Vorbestellungen eingehen. Momentan liegt die Zahl der Vorbestellungen bei rund 1500.

Wer überprüfen will, ob seine Fernbedienung Signale aussendet, kann dies ganz einfach mit der Handy-Kamera überprüfen. Dazu muss diese aktiviert werden, im Anschluss wird die Vorderseite der Fernbedienung auf die Linse gerichtet und eine beliebige Taste gedrückt. Im Display des Telefon kann nun das Leuchten der Infrarot-Dioden gesehen werden, sofern die Fernsteuerung tatsächlich richtig arbeitet. Das ist beispielsweise auf dem obigen Bild zu sehen, das mit einem Microsoft Lumia 550 aufgenommen worden ist. Im unteren Bild ist der gleiche Vorgang mit einem älteren Samsung-Smartphone aufgenommen worden.

Wie bereits erwähnt, gibt es aber durchaus Kameras, die die Überprüfung erschweren. Das ist auf dem folgenden Bild zu sehen, das mit einem Apple iPhone 6s erstellt wurde. Das Leuchten der Dioden ist bei diesem Telefon kaum zu erkennen, weshalb es mit dem roten Kreis markiert wurde.

Das klappt aber in der Tat nur dann, wenn auch Infrarot zur Übermittlung der Steuerbefehle verwendet wird. Bei einigen Steuerungen ist das nicht der Fall, etwa bei Amazon Fire TV. Hier arbeiten die älteren Bedienungen mit Bluetooth, die neueren per WLAN, weswegen keine optische Erkennung möglich ist.

Update, 05.07.2017, 14:44 Uhr: Bei den obigen Bildern wurde eine Universal-Fernbedienung von Medion (Lumia 550) sowie eine Logitech Harmony (Samsung und iPhone) verwendet. Ein weiterer Test mit der Fernbedienung des Sky-Festplattenreceivers hat ergeben, dass bei dieser das Leuchten der Infrarot-Dioden mit dem iPhone 6s nicht erkennbar ist, mit dem Lumia 550 hingegen ganz schwach. Letztlich sollte das aber kein Problem sein, denn bei Sky ist eigentlich immer der Receiver die Fehlerquelle, und nicht die zuverlässige und extrem sparsame Fernbedienung. Allerdings zeigt dieser Fall noch einmal, dass der Test stark von der Kombination aus Steuerung und Kamera abhängig ist und längst nicht immer zuverlässig funktioniert.

Smartphones mögen weder sommerliche Hitze noch die derzeitigen Minusgrade. Manche Geräte schalten sich sogar von selbst ab, wenn es ihnen zu eisig wird, obwohl der Akku eigentlich noch gar nicht leer ist. In den mobilen Telefonen sind Lithium-Ionen-Akkus verbaut. Am besten funktionieren sie bei Temperaturen von 10 bis 25 Grad Celsius. Apple gibt für seine iPhones beispielsweise eine Betriebstemperatur von 0 bis 35 Grad Celsius an.

Lithium-Ionen-Akkus sind Batterien, in denen Lithium-Ionen die elektrische Ladung in einer Elektrolytflüssigkeit zwischen Kathode und Anode transportieren. In elektronische Geräte werden sie seit Anfang der 1990er Jahre verbaut. Der japanische Technologiekonzern Sony hat sie zur Marktreife entwickelt.

Kälte verlangsamt die elektrochemischen Prozesse
Ist allerdings die Umgebungstemperatur zu niedrig oder zu hoch, verschleißt die Batterie deutlich schneller als üblich. Denn Kälte verlangsamt die elektrochemischen Prozesse, weil die Elektrolytflüssigkeit zäher wird. Und das erhöht wiederum den Innenwiderstand. Wenn nun das Handy viel Strom braucht, führt das dazu, dass die Spannung des Akkus sinkt und es zu einer Tiefenentladung kommt, die den Akku schädigt. Das vorsorgliche Selbstausschalten will das verhindern.

ANZEIGE

Das Phänomen kann vor allem ältere Geräte mit schon häufig wiederaufgeladenen Stromspeichern treffen. Zwar verkraften Lithium-Ionen-Akkus zwischen 1000 und 3000 Ladezyklen ohne Einbußen bei der Leistung. Die Batterien altern aber dennoch. Schäden in der Struktur sorgen dann dafür, dass die elektrische Spannung bei Kälte abrupt sinkt. Ist es dagegen sehr heiß, beschleunigt das die Abläufe im Lithium-Ionen-Akku. So lassen Temperaturen von 40 Grad Celsius ihn bis zu dreimal schneller altern.

Wer bei Minusgraden sein Smartphone mit nach draußen nimmt, sollte es nah am Körper tragen und mit Headset telefonieren.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 14-08-2017 à 05h13

 Batterie pour Acer AS09A73 Alerter l'administrateur Recommander à un ami Lien de l'article 

Alors, qu’est-ce que ATS ? ATS a été montré pour la première fois dans iOS 9. Dès lors que le service est activé, ce dernier force les applications à se connecter à Internet en utilisant des connexions HTTPS, qui sont plus sûres que les connexions HTTP traditionnelles. Cela signifie que, lorsque les données sont transférées à partir d’une application à un serveur, celles-ci sont cryptées.Bien sûr, un bon nombre d’applications utilisent déjà ATS — il a été activé par défaut dans iOS 9, mais les développeurs ont pu le désactiver s’ils le souhaitaient. Il était plus que probable que ce ne soit q’une question de temps avant que la fonctionnalité soit obligatoire.Apple n’est pas le seul à s’initier dans la sécurisation des données en ligne. Depuis les révélations de Edward Snowden, beaucoup de choses se sont passées afin de sécuriser les données. D’ailleurs, Apple a pris ceci très au sérieux, comme en témoigne son combat contre le FBI sur l’accès aux iPhone des utilisateurs — Apple encrypte toutes les données sur un iPhone, ce qui signifie que les agences comme le FBI sont incapables d’accéder à ces données.Il y a beaucoup de façons de regarder du contenu à ce jour : vous avez des Smart TV, des petites set-top-box, ou encore des consoles de jeu. Mais, le Chromecast de Google est un dispositif extrêmement populaire, à tel point qu’il a cannibalisé 35 % du marché des lecteurs de flux multimédias en 2015.

Quand le géant de la recherche l’a lancé en 2013, le petit dongle HDMI a fourni un moyen pas cher et facile de pousser des films et des séries TV depuis vos applications préférées afin de les « caster » sur votre téléviseur. Cela a été une réelle révolution, et a été l’un des meilleurs produits en 2013.Maintenant, le Chromecast est de retour avec un tout nouveau look, quelques nouvelles fonctionnalités, et une toute nouvelle application qui promet de trouver ce que vous voulez plus facilement que jamais. Mais, ce dongle de deuxième génération qui se vante de nouveaux ajouts vaut-il la peine d’être acheté si vous avez le modèle de première génération ?Concernant sa conception, le Chromecast de nouvelle génération a plus ou moins reçu une refonte totale. Maintenant, le dongle ressemble moins à un bâton, et est désormais un petit disque avec un court câble flexible HDMI. C’est un grand changement par rapport au précédent opus, et tandis que le Chromecast arrive dans de nouveaux coloris clinquants (Citron et Corail), la nouvelle forme rend le dongle extrêmement esthétique. En effet, ce dernier est beaucoup plus petit, et le câble du connecteur HDMI va se contorsionner, lui permettant de se faufiler dans des espaces serrés où les ports sont difficiles à atteindre.

L’aimant à l’arrière de la petite rondelle permet de maintenir le câble, et il vous permet d’apposer le dispositif soit sur le câble lui-même ou à l’arrière de votre téléviseur — tant que le châssis de celle-ci soit métallique. Comme l’original, le Chromecast va pouvoir être alimenté par une prise standard, ou par un port USB compatible à l’arrière de votre téléviseur.Vous trouverez le logo Chrome fièrement décoré sur le dessus. Parlons du disque lui-même. Il est petit (51,9 x 51,9 x 13.49 mm), et il se glisse discrètement dans la paume de votre main.À l’intérieur du petit disque, un trio d’antennes permet au dispositif de tirer le meilleur de la connectivité Wi-Fi. Le Chromecast est désormais compatible avec la connectivité Wi-Fi 802.11ac, et il va se connecter à des points d’accès en 5 GHz. Toutes ces améliorations sont destinées à améliorer la stabilité de la connexion, et l’expérience du streaming.Sur le papier, il est difficile de réellement mesurer l’amélioration apportée à la connectivité, puisque je n’ai jamais rencontré de problème particulier avec ce périphérique. Pourtant, ceux qui ont rencontré quelques difficultés par le passé devraient voir au moins une certaine amélioration.

Chromecast 2015 : branchez-le sur votre TV par le port HDMIChromecast 2015 : branchez-le sur votre TV par le port HDMI Lorsque Google a dévoilé le Chromecast à San Francisco, le géant de la recherche a également affirmé que le dispositif offrira une meilleure qualité vidéo et audio, avec moins de mémoire tampon pour une meilleure expérience globale. Mais à part une forte emprise sur votre signal Wi-Fi, il n’y a pas de véritable changement dans la qualité de streaming.Le nouveau Chromecast offre une qualité vidéo 1080p, tout comme son prédécesseur, et (pas de surprise à 39 euros), il ne supporte pas le contenu 4K UHD, ce que d’autres périphériques offrent, notamment le nouveau Amazon Fire TV et le Roku 4.Une fois que vous avez alimenté l’appareil et branché ce dernier sur le port HDMI de votre téléviseur, il sera temps de passer à travers le processus d’installation du nouveau Chromecast. Le processus de configuration prend pas plus de cinq minutes, et la plupart de celles-ci sont utilisées pour télécharger l’application Chromecast soit depuis le Google Play Store ou l’App Store d’iOS — bien que vous pouvez également utiliser un PC ou un Mac pour streamer du contenu sur le Chromecast. Vous serez invité à connecter le Chromecast à votre réseau sans fil. Le tour est joué !

Chromecast 2015 : vous allez pouvoir streamer de nombreux contenusChromecast 2015 : vous allez pouvoir streamer de nombreux contenus Les nouvelles touches apportées au design sont agréables, mais si l’on doit décortiquer ce qu’il y a de nouveau avec le Chromecast, cela se passe au niveau de l’application. Contrairement à un grand nombre d’autres entreprises de haute technologie, la nouvelle version de l’application de Google fonctionne avec tous les appareils Chromecast, y compris les nouveaux et les anciens — et le nouveau Chromecast Audio. En dehors de la famille des Chromecast, l’application offre une surabondance de nouvelles fonctionnalités qui en font une bonne raison d’en acheter un.L’application est divisée en trois grandes catégories. Dans l’une d’elles, vous allez retrouver une sélection de titres de toutes les applications que vous avez déjà sur votre smartphone. Ensuite, la section « Appareils » vous permet de basculer facilement entre vos multiples Chromecast, que ce soit vidéo et/ou audio. Le dernier volet permet de télécharger les applications, qui, comme vous l’aurez deviné, sont compatibles avec un Chromecast.

Dans les paramètres de chaque périphérique, il est désormais facile d’ajouter vos propres photos (backdrop) à partir des services tels que Flickr, Facebook, et vos comptes Google pour mélanger avec les magnifique photos récupérées sur le net que le Chromecast met en fond d’écran. En effet, lorsque vous n’êtes pas en train de streamer du contenu sur le Chromecast, il entrera dans un mode économiseur d’écran qui permet d’afficher de multiples sources d’informations.Une nouvelle fonctionnalité plutôt cool de l’application Chromecast est l’ajout de la recherche multi-plate-forme, permettant de rechercher des contenus par la saisie textuelle ou vocale depuis l’une de vos applications de streaming Chromecast. La recherche fait une énorme différence quand elle est accessible à votre convenance — surtout quand vous êtes sur le dense catalogue de Netflix. Et, la nouvelle fonctionnalité permet (enfin) au Chromecast de mieux rivaliser avec la horde des plus coûteuses set-top-boxes et autre TV Stick d’Amazon, Roku ou Apple.En cliquant sur le micro, vous allez rechercher par la voix ou par une saisie manuscrite, soit des séries TV ou des films, des genres, comme des films d’horreur ou de science-fiction, ou encore le nom de votre acteur favori. Une fois le contenu affiché, un simple clic sur le titre vous redirige directement vers l’application appropriée. Évidemment vous devez toujours contrôler la lecture à travers l’application elle-même, mais c’est néanmoins un grand pas en avant.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 14-08-2017 à 05h39


|<< <<<  126   127   128   129   130  | 131 |  132   133   134   135  >>> >>|


SYNDICATION
 
Fil RSS 2.0
Ajouter à NetVibes
Ajouter à Google
Ajouter à Yahoo
Ajouter à Bloglines
Ajouter à Technorati
http://www.wikio.fr
 

Allzic en direct

Liens Commerciaux
L'information à Lyon
Retrouvez toute l'actu lyonnaise 24/24h 7/7j !


L'information à Annecy
Retrouvez toute l'actu d'Annecy 24/24h 7/7j !


L'information à Grenoble
Retrouvez toute l'actu de Grenoble 24/24h 7/7j !


Application Restaurant
Restaurateurs, demandez un devis pour votre application iPhone


Fete des Lumières
Fête des lumières : vente de luminaires, lampes, ampoules, etc.

Votre publicité ici ?
  Blog créé le 11-07-2016 à 05h33 | Mis à jour le 22-08-2017 à 06h51 | Note : Pas de note