- STROLLERS
POWER FOLDING: Folding a stroller with one hand while carrying a child in the other can be frustrating for many parents. The power-folding Origami stroller from 4moms seeks to make one-handed folding a lot easier. At the push of a button, the $650 stroller, which will be available in September, uses a motor to fold and unfold. When sensors detect a child in the seat, the function is disabled.
TOT TUNES: To make a workout ride more enjoyable for both baby and parent, more strollers are coming equipped with hookups for MP3 players. Baby Trend Inc. makes three jogging-stroller designs -- starting at $159.99 -- that have an MP3 connection, a device storage pouch and a speaker in the canopy. Later this year, the manufacturer plans to offer a redesigned version that puts the music connection in the handle area, where it's more convenient.
WEDDINGS
INTERACTIVE I DO'S: More couples have started adding interactive elements to their events, Ms. Roney says. Such elements include lounge areas where guests can play the latest interactive videogames, as well as video screens on the dance floor with music videos and lyrics so guests can sing along.
INSTANT GRATIFICATION: Immediately after weddings, photographers are giving couples mobile devices filled with images from the event. Videographers are also now playing highlights from the ceremony on screens during the reception, and guests are increasingly uploading their own tagged shots to social-networking sites right after the party.
SECURITY THREATS
PASS THE HASH: Hackers spend a lot of effort stealing passwords. Now they don't have to. Most computers store an encrypted version of a user's password, called a hash, on the computer itself. New hacking tools that take advantage of flaws in a computer's operating system make it easier for sophisticated hackers to locate and copy the hash and then gain access to any password-protected system.
FREE CALLS: As businesses increasingly use the Internet to route phone calls, hackers will step up efforts to exploit these systems. One new threat: A hacker taps into the system and sets up his own phone line. He then can use it to make free calls -- or worse, carry out scams by impersonating employees.
No comments:
Post a Comment