Saturday, August 23, 2014

TABLET MOBILE PRINTER

August 20, 2014

Originally, I thought of the idea of having an ORS (object recognition software) before I discovered that it should be feasible within 5 years. This is going to be awesome and very useful in the future. 



I got the idea of my "solution" from my post before (dated June 11, 2014). It's always been a hassle for me to print my documents and pictures because I need to bring my laptop over to where my printer is located and still need to assemble the printer itself. Ugh, consumes too much of my time.


 
So, why not create a portable "dock" printer or portable "cabled" printer for our tablets and smartphones? Print anytime, anyplace. This would help a lot of businessmen who are on the go and us students who want to print assignments anywhere (ex. right before passing them lol). In the future, the printers would be built-in in our tablets, laptops, smartphones. 


There was a Canon laptop manufactured that has a built-in printer but wasn't commercially successful. Why? It was heavy and very thick! This is the main problem, I guess, for NOW. Knowing us (humans), we can discover a lot of ways to make the things we want HAPPEN. 


PAINT editing skills
========================================================================
Last blog post. Farewell.

Saturday, August 16, 2014

thepiratebay

August 14, 2014

I visited thepiratebay 30 minutes ago and this is what the homepage looked like:

Just like what happened to Kim Dotcom (The Megaupload founder guy), Gottfrid Warg and Peter Sunde were arrested and sentenced to one year in prison. They were charged with "assisting others in copyright infringement" and were ordered to pay $30 million dollars for the damages they have caused.

They are still in prison now according to what is written on the homepage of thepiratebay. I'm really happy that the website is still functioning even though 2 of its founders are in prison. I am guilty of downloading pirated files. I get a lot of files/movies/games/music there. Can't imagine what would happen if they shut it down. 

Monday, August 11, 2014

AntiVirus

August 11, 2014

It's kind of a right timing that our topic involves computer viruses. For almost 5 months, I have been using my laptop without any Antivirus software installed because My McAfee Antivirus already expired and my dad doesn't want to spend renewing its license. (Which is wrong. If my laptop gets affected by a virus, fixing it would cost more-in terms of headache of losing files and not for the payment because it's easy to reformat and re-install Windows)

So I've recently installed Avira Free Antivirus on my laptop because I noticed strange symptoms on it:
  • Executing a file takes longer time than usual.
  • Mouse movement was laggy
  • Frequent software crashes
VIRUS ALERT! VIRUS ALERT! came to my  mind, So I've installed the antivirus and scanned my laptop. And there they were, 2 viruses and 3 malicious software. Freaking sneaky viruses.

My laptop seems better now and lost the symptoms mentioned above even though I didn't reformat it because I don't want to lose any files. I'm just going to believe that Avira removed the viruses. #tiwala

Friday, August 8, 2014

Phishing

August 6, 2014

"Phishing - a play on the word "fishing" - is an attempt to steal your password and private account info. Phishers can set up fake web sites that look like those of trusted companies like Yahoo to trick you into disclosing your user name and password."

Thanks to Yahoo! Mail, I discovered early what phishing does. The website allows an option to create a seal (either an image or text) that you should see to make sure you are on the legit Yahoo! site. And yes, it is still available until now.

Visit the website: https://protect.login.yahoo.com/

------------------------------------------------------------------------------------------------------------

Way back on 2005, Chris Putnam and two of his friends created a worm code that changed Facebook profiles look to MySpace profiles look and along the way deleted contact information of users. Since they've created a worm, it copies itself from profile to profile.

When Facebook received complaints and discovered Putnam was the creator, co-founder Dustin Moskovitz offered him a job and hired him. 

Visit: http://www.quora.com/Chris-Putnam-1/How-did-Chris-Putnam-get-hired-at-Facebook

Friday, August 1, 2014

Hacking

July  28, 2014

Last November, my mum was hacked on Twitter by a random person. He hacked a lot of Twitter accounts and made them follow his account, changed their cover photos, and tweeted to each account "Look how easy it is for me to hack your passwords!" My mum made me changed her password as soon as she discovered and told us (me and my sisters) to change ours also. Paranoid!

How did he get the passwords of 200+ people? I don't know how but I think it's awesome. Hahahaha, regardless of getting my mum's.


Oh and when I download cheats for some games that I play, they are also called "hacks". I just search on google "*insert name of game* hack", then if I'm lucky there will be legit results popping out. 
------------------------------------------------
As an IS student it is my job to prevent these types of events and to provide security but maybe I can also learn how to hack at the same time. Hehehe. I want to know my neighbors' wifi password so I can surf the net for free!!! 



Law and Order


"ACCESS NATION"

1.)    Tracking credit card transactions. (REAL)
Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting a court order, a new document released under a government sunshine request shows.

“Hotwatch” orders allow for real-time tracking of individuals in a criminal investigation via credit card companies, rental car agencies, calling cards, and even grocery store loyalty programs.
Sources:

2.)    Police can check phone call records history.  (REAL)
Police can get phone records without a warrant thanks to Smith v. Maryland, a Supreme Court ruling in 1979, which found that the Constitution's Fourth Amendment protection against unreasonable search and seizure doesn't apply to a list of phone numbers. The New York Times reported last week that the New York's police department "has quietly amassed a trove" of call records by routinely issuing subpoenas for them from phones that had been reported stolen. According to The Times, the records "could conceivably be used for any investigative purpose.
Sources:

3.)    Recover previous file versions.  (REAL)
On Windows and Mac, there is an option to restore previous versions of files.
“Previous versions are either copies of files and folders created by Windows Backup or copies of files and folders that Windows automatically saves as part of a restore point. You can use previous versions to restore files and folders that you accidentally modified or deleted, or that were damaged.”
The saved previous versions depend on the amount allotted for the backup. When the allotted storage becomes full, the computer deletes the oldest backup file and replaces it with a newer backup. 

I think this is how the tech got the original version of Rice’s file.
Sources:

4.)    Worm that can monitor and control other person’s computer. (REAL)
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

There is also a computer Trojan called RAT (Remote Access Trojan). It is usually transmitted through an executable file or in an email attachment. It is usually disguised as something desirable and harmless, such as a video game or other piece of software. It enables the hacker to control his computer’s victim from another location. The hacker can block the mouse and keyboard, delete, download, rename, and upload files, log keystrokes and get passwords, play sounds, open the DVD tray, edit the registry and many more.
Sources:
https://www.youtube.com/watch?v=xUlivXL1Y0Q (A demo of DarkComet a popular RAT)

5.)    Magic Lantern of the FBI. (REAL)
“Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation. Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on 20 November 2001 and by Ted Bridis of the Associated Press.”

Magic Lantern can reportedly be installed remotely, via an e-mail attachment or by exploiting common operating system vulnerabilities, unlike previous keystroke logger programs used by the FBI. It has been variously described as a virus and a Trojan horse. It is not known how the program might store or communicate the recorded keystrokes.
Sources:

6.)    Leaving a copy of a file when you delete it from a hard drive. (REAL)
Recycle Bin is not the end of the road for our files.
“When a file is deleted from your computer, its contents aren't immediately destroyed. Windows simply marks the hard drive space as being available for use by changing one character in the file table. If you manage to start an undelete process before Windows overwrites that part of hard disk with new files.”
Source:

7.)    Every e-mail we send contains a hidden header with our IP addresses. (REAL)
Each sender of an e-mail has an Internet Protocol (IP) address associated with their computer. While not every email address can be tracked, using the fields that are hidden from view by top email providers, it is possible to track many emails down to their area of origin.

Sources:

8.)    Cracking password-protected files. (REAL)
Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password.
Sources:

9.)    Linking users with their IP addresses. (REAL for Law Enforcement)
Only the law enforcement with subpoenas can do this. They can obtain the name, address, telephone number, electronic mail address, Internet protocol address and local service provider identifier of a user.
For ordinary people like us,

Here's what you can do with an IP trace:
·         Determine the general area of the target's location (City/region, state, country).
·         Determine what ISP they use.

Here's what we cannot do with an IP trace:
·         Determine the target's home address.
·         Identify the computer that is assigned that IP address.
·         Determine the identity of the person using the computer at that IP address.

In the movie, Kinston said that he can link a person with an IP address. I think this part is not true.
Sources:

10.)  Internet Tracking (RFAL)
A growing number of websites are employing a stealthy new form of hard-to-block Internet tracking software that may pose increasing privacy risks for customers.
Canvas fingerprinting, which can command your browser to draw a unique identifier and then log your online behaviour, is nearly impossible to detect, does not fall under “do not track” voluntary systems and evades most conventional ad-blocking software. It is already tracking users on 5 per cent of the biggest sites on the Internet, including The White House, Starbucks, Re/Max Canada, Canadian retailers Metro and Home Hardware, Postmedia website Canada.com, as well as a number of pornography sites.
Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD.
According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IP addresses logged by the NSA and can be flagged for further monitoring.

*Woops, I searched TOR online. Maybe NSA is tracking me now.*
Sources:


11.)  Face recognition software (REAL)
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.
In the 2000 presidential election, the Mexican government employed facial recognition software to prevent voter fraud. Some individuals had been registering to vote under several different names, in an attempt to place multiple votes. By comparing new facial images to those already in the voter database, authorities were able to reduce duplicate registrations.
Facial recognition systems are used to unlock software on mobile devices. An independently developed Android Marketplace app called Visidon Applock makes use of the phone's built-in camera to take a picture of the user.

*This was mentioned at the last part of the episode*
Sources:
http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition.htm

Saturday, July 26, 2014

Bonus Post


The FIRST Seminar-ish: 

The ASES Summit Manila 2014 aims to promote student entrepreneurship, business innovation and global business networks amongst top international college students. The theme for this year’s international summit is: “social entrepreneurship in the world of tech startups.”

The event was kind of a Oral Defense. There were several groups (of different nationalities) who proposed business solutions with the help of technology to solve some of our problems here in the Philippines. Almost all of them said that there's a gap between our resources and technologies and they want to fill those "gaps" to fully utilize our resources. 

Bam Aquino (kind of, can't remember the exact words) said:
"If you're going to use the same solution to solve the same old problem, NOTHING will happen"

I like the proposal of the team One Up. They're going to make an application that will get Php 1.00 pledge from every donor and in return donate the money that they will collect to help children study. Even a small amount of donation can help and I guess if the donor wants to donate a larger amount, they can. 


 ------------------------------------------------------------------------------------------------------------
The SECOND Seminar: "It's a TechnoBusiness!"

The first speaker was Mr. Ronald Isip who works for a company called INDRA. He was showing a lot of flowcharts and stuff on his presentation (kind of hard to take in) but from what I gathered is that his company aims to make a large company turn world class through automation. He shared guides on how to properly manage a system and said that experience is a great factor in finding jobs in the future.

The second speaker was Mr. Julius Gorospe, the director of R&D in Samsung Philippines. He studied computer science then kind of shifted to management because he said that "Ang hirap naman pag nagproprogramming pa din kapag puti na ang buhok." Kind of struck me because it's true. Baka mapaaga ang retirement dahil sa stress sa programming. Sad. Lol.

What's funny though is that he uses an iPhone instead of a Samsung mobile. "Keep your friends close and your enemies CLOSER." Mwahahahaha.

He said that what was great about Samsung is that they can go with the flow - like produce gadgets that are "in"- in today's market. And that is why there are known for a lot of products - not just for smartphones.

*I was surprised to discover that SAMSUNG started out as a noodle corporation.*
Start of Mr. Gorospe's seminar
Q&A






Monday, July 21, 2014

CVS

July 21, 2014

Using a computer for long periods of time may cause negative effects such as headaches, blurred vision, eye strain, dry eyes, irritated eyes, polyopia (multiple vision), and difficulty refocusing the eyes but NOT cancer. The negative effects are symptoms of Computer Vision Syndrome (CVS).


Source
I remember my mom telling me a technique to avert these bad effects, something about looking at trees outside or far objects for at least 20 seconds to relax the eyes. For people who want to prevent or lessen the symptoms, such as me (a heavy computer user), the rule my mom was talking about was the 20-20-20 RULE. 20 Minutes, 20 Feet, 20 seconds. What. What is it, you might ask. 

For all you heavy computer uses. 
----------------------------------------------------------------------------------------------------------

Monday, July 14, 2014

Prominent Companies Part 2

July 14, 2014



Yahoo! was very famous for it's product - YAHOO MESSENGER - before. I still remember the days when the first thing that I'll do after booting our computer or laptop was to open the messenger. It used to have the best chat service before Facebook Chat was introduced. 

Now, I just use Yahoo! for it's email service. R.I.P messenger.

Tried  to see if there were still people using the yahoo messenger.
*Just FYI. Why Yahoo! (with the exclamation point)???*
" At that time "Yahoo" was already trademarked by a company that produced barbecue sauce, knives and human propelled watercraft. For this reason Yang and Filo added the exclamation point to the end of Yahoo!"

------------------------------------------------------------------------------------------------------------



One reason why I am hating Apple right now is they tend to forget about the processor limit and capability of their past products when they release new iOS software. For example, my iPod Touch 4th Gen (even for other people). When it was on iOS 4, it performed smoothly. But when I updated it to the latest software available (iOS 6), it crashes A LOT. Before, I can use my iPod for games and social apps but now since it can't handle anything (even when I'm only using Safari), I only use it as an mp3 player. Back to its original purpose. It's like they do it on purpose so you'll have the urge to throw away your gadget and buy their new product.


Saturday, July 12, 2014

Prominent Companies Part 1

July 9, 2014



Microsoft is one of the largest and most valuable company that develops computer software and personal computers. It's operating system - WINDOWS - is still the most popular operating system being used today. It is widely-supported and user-friendly. 

I think that Windows is the best OS for gaming and for business because there are a lot of software and games that are compatible with it. Why? 

"When Bill Gates started to develop Windows he made the software information free to developers of software. Steve Jobs at Apple sold the OS software information. So, most software developers decided to make software just for Windows OS since it didn't cost anything. " - Terry Scott

Maybe Microsoft  wasn't trying to monopolize the computer industry, they just like to share. Maybe.




Google started off simply as a search engine. But since then, it has bought a lot of companies such as Blogger, YouTube, Android and has already developed a lot of os, apps and gadgets.  They're even developing a self-driving car now. Define AWESOME. 

 

Oh but wait, look at the list of what companies  Google purchased on December 2013:

  • Schaft Inc, a humanoid robots company
  • Industrial Perception, computer vision systems and robot arms for loading and unloading trucks
  • Redwood Robotics, a robotic arms company
  • Meka Robotics, a humanoid robotics company
  • Holomni, a robotic wheels company
  • Bot & Dolly,  a robotic camera company
  • Autofuss, an ad and design company
  • Boston Dynamics, a military and industrial  robot company
Google trying to create an army of robots to take over the world? Nah. I don't think so. 

Thursday, July 3, 2014

System Analyst

July 2, 2014

As we have discussed, it professionals tackle wide range of jobs. For Information Systems graduates, they would most likely become system analysts.

What does a System Analyst do??

A systems analyst is an IT professional who specializes in analyzing, designing and implementing information systems solutions to help an organization operate more efficiently and effectively.

Image Credit
I think that system analysts should be critical thinkers so that they would come up with great solutions to problems that their companies would encounter. Honestly, I want to become an analyst than to become a coder because some analysts have their partners (coders) to create the codes to finish the work faster. If that's the case, I can get away with the code making part. But it is important for a system analyst  to be great programmer also so no getting away with codes!

Tuesday, July 1, 2014

Software

June 30, 2014

We discussed the last steps in making a program - Compile, Test and Debug the program. 

Compile is the time we put our source codes in our chosen IDE.

Test is when we run our codes to see if they work. In Netbeans, I always try to make sure to test as many variables that I can, just to make sure that my codes really work. Better be safe than sorry!

Debugging  is to find and fix errors and problems in the codes. It is a hard task because as said in class, we'll never get away from bugs. I think it's true. I noticed that many apps released for our smartphones are provided with "updates" by their creators. These updates are done usually to fix bugs/glitches that occur and to add features.

Look at below, "Bug fixes and improvements"
After learning the processes, I've concluded that work of a programmer is very exhausting!
------------------------------------------------------------------------------------------------------------
Oh and when using software, I try my best to find freewares instead of paid ones. Whenever I need a paid software/app, I try my best to search cracked versions online just like my MS Office 2013.

I salute programmers who make freewares. After all the stress and hard work they've gone through to create their programs (we all know it is not easy), they share them for free. WOW. So I guess, there are still things you can get for free. 

Saturday, June 28, 2014

Programming Process

June 25, 2014

        Before we could create an excellent program, there are important steps that we should remember. I noticed that they are similar with the scientific method.

So yeah, first we need to understand the problem / observation and it is not an easy task. Most problems need serious thinking to be able to grasp it and not all the time we would be able to understand them. Think. Think. Think.

Second is to create an algorithms / create hypothesis that will solve the problem. Pseudo codes and Flowcharts. Writing and taking notes of steps is great so that we wouldn't forget them and we could arrange them in right sequence. When we were tasked to create flowcharts for in 4th year, it took me a long time to finish because I got confused by the different shapes to be used. I asked myself, "Why not just list down the steps? Bullet form would be best." Pseudo code is better, in my opinion.

Third, convert the algorithm to programming language / experiment. This would be the time to use an IDE (such as Lazarus, NetBeans, and Eclipse) to input the codes. Right now, I'm using NetBeans because it is the one our professor in IntPrg told us to use. I don't memorize all java keywords (there are a lot), so sometimes I commit lexical errors and make up my own words.

------------------------------------------------------------------------------------------------------------
*It is a programmer's task to make a user's life as easy as possible while he has a hard time creating programs. Haha. How sad.

Monday, June 23, 2014

Programming Language

June 23, 2014
                
             Computers have their own languages, called programming languages. There are a lot. Just like us humans, we use different languages. As a BS-INSYS student, it is part of my job to learn some of the computers' languages. Oh life. As we've discussed, there are three (3) levels of programming language: Low level (ex. machine), Middle level (ex. assembly), High level. 
  
          Since I'm a beginner in programming, I've only used Visual Basic in 4th year high school and only started learning Java in IntroProg,  I'm going to study the High level since it is the closest to human language among the three. 

        *Actually, in high school we didn't really study Visual Basic well. Most of us "Copy-Pasted" codes from the internet because we wanted to finish ahead of time to play Counter Strike or DOTA. YEAH, our school computers have games installed on them and we were allowed to play them if we have finished our work. Hooray! HAHA.

------------------------------------------------------------------------------------------------------------
          
           We also talked about artificial intelligence and we all know that it isn't quite perfect yet. Like Siri, it's voice recognition is still buggy and it still doesn't know a lot. Unlike with Samantha, the OS in the future with AI from the movie Her, it's like you're talking with a real smart person. Oh, which I've realized is kind of creepy. 

Siri's trying to change the subject :(
I guess I should follow the 3rd important rule when giving instruction to a program:
1. Instructions have to be complete.
2. Instructions should be in correct sequence.
3. Instructions should be in programming language


Saturday, June 21, 2014

Software

June 18, 2014

              In grade school, the course that I wanted for college was "Computer Science". I loved playing with computers back then and thinking that there's a "computer" word in that course, I thought it would be great! As I stepped into high school, I learned that I suck in Math (I don't know what happened, I used to love it!) and that ComSci is loaded with hardcore math subjects. Ay patay.

           When it was time to choose a course, my cousin told me that IT was kind of lighter than ComSci. I was going to choose it but my classmate from high school told me that IS is also lighter and has a business side. It sounded cool to me, tech and business combined. So yeah, that's how I got here. Before, my mom asked me the differences between IT, IS, Computer Science and woopsy I didn't know. 

-----------------------------------------------------------------------------------------------------------
SOFTWARE

           My laptop was originally installed with Microsoft Office 2007. When the latest version came out, the 2013 version, of course I wanted to update mine. I didn't want to spend anymore, so I downloaded it online and got it for free. Shhh. Microsoft Office is an example of a pre-built software.

             

            There are freeware that can be great alternatives for paid software. For MS Office, a great alternative would be Kingsoft Office, OpenOffice, LibreOffice, etc. 

            For large companies, they hire they're set of programmers as their staff to create in-house programs. For small companies, they find programmers to create out-source programs.


------------------------------------------------------------------------------------------------------------
           My sister's friend, who is an IT, works at a large tech company here in the Philippines. She also goes to work once a week only, like the friend of Sir Encarnacion. I heard that she has a big salary but she's kind of getting tired of her job already. It is really true what our professor said that the work of programmers is hard. Cry. So I guess I should really study and improve in our programming subject.



Monday, June 16, 2014

Input Devices and Operating Systems

June 16, 2014

Scanner
         I was very young when we had a scanner, so I didn't get to use it. It's dead (broken) now and I only use my smartphone to "capture" a paper. I have downloaded an app on my smartphone that I use as an alternative "scanner". It is called "CamScanner" and it is free for Android smartphones.


  Here are screenshots of the app:



The finished product in B&W version
I'm lucky that my Starmobile has a 12MP which can usually capture texts clearly. Hihi, it's cheap btw. Most of smartphones now have high mega-pixel camera, so it wouldn't be a huge problem to capture small texts. Though shaky hands and light focus would be troublesome. Maybe it's not the same when you use a flatbed scanner, but it is good enough. Oh! I think it would be easier to use than a hand-held scanner.


Controller
           2K14. My friend influenced me to play it, so I installed it on my sister's laptop before. (My 6 year old laptop can't handle any hardcore games and RIP keyboard) Playing using the laptop keyboard was so hard because of the complicated and broken keys. I had to buy a CD-r King USB gamepad controller, with "shock" effect, similar look with the ones used on PS2.

Go CD-r king?
It good thing it's only Php 350.00. I didn't get to play the game a lot because I play alone and my sister didn't want me using her laptop. :(


Operating Systems
            I have tried Linux and Mac and found them confusing to use because I have Windows 7 installed on my laptop. In my opinion, it is the best version of Windows as of now. They removed the "start menu" on Windows 8 and changed it with the tiles (metro). WHY. But good to know that Microsoft is planning to resurrect it on a future update for Windows 8.1. 



=====================================================================


Thursday, June 12, 2014

Output and Input Devices

June 11, 2014

Back to my previous post, I started using a computer since kindergarten but output devices and input devices were thoroughly discussed in grade school. So, yes most of us know what they are. Recalling what devices I can share a story with...

Output Devices:

Monitor 
Image Credit: Jestineyong


CRT (Cathode-Ray-Tube) was the first type of monitor that I got to use in school and we owned 2 of it back then. This is the box-type monitor which would take a lot of space in anyone's table. I remember my classmates and I playing with the monitor in class, turning it off, rubbing our hands on it then immediately touch one another. We would feel the "electric shock" and laugh, usually. Some got pissed, woops! 

Now, my family do not use any desktop computers. We left our last CRT at our previous home and only use laptops. 





Image Credit: ShopTechPartners
Printer 
"Assignments assignments assignments" - is what usually come to my mind when we talk about printers. We own an HP Ink Jet printer since 2010 that we got at a reasonable price. Sometimes, it malfunctions because the components inside get dirty. Good thing though that it has a "clean" option and it would clean itself. I didn't like it in high school when my classmates ask me to print for them because I was too lazy to set-up the printer and they will consume our ink. The ink is more expensive actually than the printer itself. Although there are ink "refills", which my high school uses to save money, we opt to use the hp made inks to avoid voiding our warranty. 

We actually wanted to buy a Laser Jet printer so that the printing process would be faster, but it is more expensive than a Ink Jet printer.



Speakers
Image Credit: Amazon



For laptops and tablets, they have in-built speakers in the machines. When I play music on my laptop, it doesn't really have the "Bass Effect" that I want but it's alright. We do not own any speakers except the small portable one that we use for our iPods. 





Input Devices:

Keyboard

Image Credit: Aramedia

Sir Encarnacion said there hasn't been a lot of updates for this device,and yes I agree. Almost every keyboard / laptop keyboard has the same keys and same appearances with one another. Except mine.

Yikes!!!


One day, I was typing an assignment when suddenly the keys of "D" and "Fn" popped up out of nowhere! And damn I didn't know how to put it back. Sad to say, the Fn , CAPSLOCK, left control and the left keys aren't working anymore but luckily the D still does.




Mouse
Image Credit: Logitech




We kept on changing our wired mice before because most of them get damaged and malfunction easily. I miss the ball at the bottom of the mouse, I kept removing it on its place and played with it. 
Suddenly, I do not miss it anymore. Ew.



We also had retractable mice but also didn't last long. Since we only use laptops today, we use track-pads daily instead. But we own a wireless mouse if ever we need to Photoshop pictures, play games, edit music and edit videos because it is easier to control.



----------------------------------------------------------------------------------------------------------------------

So yeah, I noticed that these devices even a camera can be found all in one on a laptop. Except a PRINTER. I hope that in the future, they'll manufacture a printer also built-in on a laptop. That would be extremely great.