Technology News

Roman Age coins hoard declared a ''treasure trove''

Roman Age coins hoard declared a ''treasure trove''London, Nov 3 : One of the largest deposits of Roman coins ever found in Wales, UK, which consists of nearly 6,000 copper alloy coins, has been declared a treasure trove.

According to a report by BBC, the Roman coins hoard was found buried in two pots in a field at Sully, Vale of Glamorgan, by a local metal detector enthusiast in April.

Two separate hoards were found by the metal detectorist on successive days, one involving 2,366 coins and the other 3,547 coins, 3m away.

Coming soon: PCs based on young users’ dreams

Coming soon: PCs based on young users’ dreamsLondon, November 3: Intel and ASUS are urging people to dream about and tell them what do they want in an ideal computer so that they could design PCs in accordance with the user community’s desires.

The companies have created a website, WePC. com, to enable people to share and comment on ideas to "enable a global conversation about the ideal elements of a PC."

Both companies insist that they are actually committed to building an ideal machine based on their customers’ feedbacks.

Apple MacBook Pro launched

Apple MacBook Pro launched Apple's MacBook Pro is built from a sinlge block of aluminum, called unibody. This 15in MacBook Pro is quite stylish and will definitely tempt the business executives. It is not that heavy too, so could be carried from one place to place easily.

However, the extra-glossy coating might create a problem while it is being used outdoors, since it would be really prone to reflections. But in office environments, it would be perfectly fine.

The company claims that LED-backlit will use less of battery and the users could use it continuously for four and a half hours.  

Nokia finally launches ONE, its most awaited mobile game

Nokia finally launches ONE, its most awaited mobile game

House Key Can Be Copied From Its Picture

A new and innovative technique has been developed by the security researchers, with which they can copy house keys just by using its picture as reference.

This technique has been developed by computer scientists at UC San Diego, and it needs no physical access to keys and only a fairly low resolution picture for the software to work. The scientist say that this technique has been developed by team with the aim to reveal to everyone that keys are not as secure as they are thought to be.

Loads of stolen credential Financial Data found

Pages