Monday, 29 December 2014

Waterproof Phones :)

Whether accidentally dropped in a sink, toilet or a swimming pool; soaked by a rainstorm or a beverage; sent through a washing machine or victimized by a water gun- this is how a over million smartphones are water-damaged each year.

Touch screens , apps, web access and voice recognition are same of the reasons smartphone sales are through the roof every year.But Buyer beware, the device are not waterproof- not even close.

Water in electronic gadgets is catastrophic.Warranties rarely cover the damage and new contracts are usually required.You lose your information, contacts, apps, and photos.Not fun.

But we may soon have waterproof phones because of a new technology that uses nanotec coatings.

Two companies leading the research and development into this technology are HzO and  Liquipel.

HzO won the CES 2012 Innovations, Design and Engineering Award for its nano coating technology while while liquipel received a 2012 Edison award in material science for its nano coating technology.

Both companies use a vapor deposition process to coat electronic devices with a very thin film.This film is hydrophobic, which means that it repels water , humidity, perspiration, coffee, wine, soda and even acid.

The coating does not trap heat, is virtually weightless,invisible and non toxic,which makes it great for protecting electronic devices.

How It Works:

A device is placed with in a vacuum chamber.A vacuum chamber is created and a specially formulated vapor is introduced in a chamber.

This vapor seeps into the electronic components of devices depositing a uniform layer of molecules that repel water.

These coating are not meant to protect smartphones during deep sea dives or for any extended underwater use.

They will protect devices against damage caused by accidental immersions even if the device has been left submerged in water for a few hours.

Though HzO and Liquipel both use vapor deposition for application, their respective coatings and applications are different from one another.

Both HzO and Liquipel provide their services to manufacturers but Liquipel will also provide directly to consumers. 


 

Sunday, 28 December 2014

What is Computing power?

What makes a supercomputer so super? Can it leap tall buildings in a single bound or protect the rights of the innocent? The truth is a bit more mundane. Supercomputers can process complex calculations very quickly.
 
As it turns out, that's the secret behind computing power. It all comes down to how fast a machine can perform an operation. Everything a computer does breaks down into math. Your computer's processor interprets any command you execute as a series of math problems. Faster processors can handle more calculations per second than slower ones, and they're also better at handling really tough calculations.
Within your computer's CPU is an electronic clock. The clock's job is to create a series of electrical pulses at regular intervals. This allows the computer to synchronize all its components and it determines the speed at which the computer can pull data from its memory and perform calculations.


When you talk about how many gigahertz your processor has, you're really talking about clock speed. The number refers to how many electrical pulses your CPU sends out each second. A 3.2 gigahertz processor sends out around 3.2 billion pulses each second. While it's possible to push some processors to speeds faster than their advertised limits -- a process called overclocking -- eventually a clock will hit its limit and will go no faster.

As of March 2010, the record for processing power goes to a Cray XT5 computer called Jaguar. The Jaguar supercomputer can process up to 2.3 quadrillion calculations per second.

Computer performance can also be measured in floating-point operations per second, or flops. Current desktop computers have processors that can handle billions of floating-point operations per second, or gigaflops. Computers with multiple processors have an advantage over single-processor machines, because each processor core can handle a certain number of calculations per second. Multiple-core processors increase computing power while using less electricity.

Even fast computers can take years to complete certain tasks. Finding two prime factors of a very large number is a difficult task for most computers. First, the computer must determine the factors of the large number. Then, the computer must determine if the factors are prime numbers. For incredibly large numbers, this is a laborious task. The calculations can take a computer many years to complete.
Future computers may find such a task relatively simple. A working quantum computer of sufficient power could calculate factors in parallel and then provide the most likely answer in just a few moments. However, quantum computers have their own challenges and wouldn't be suitable for all computing tasks, but they could reshape the way we think of computing power.

Hi-Tech Gadgets for The Modern Cook :)

iGrill Mini:


What is the fun of a BBQ when the chef is tied to the grill waiting for the steak to reach the right temperature? What if your cell phone let you know that the main course is ready? This is precisely what the iGrill Mini does. Probe your meat, tell the app what you are grilling, and sit back and relax. You can see the progress of your meat right on the app's dashboard.

Taylor Digital Measuring Cup and Scale:


I love any product that can multitask, and this digital measuring cup and scale is a winner. One of the coolest things about it is that you can add one ingredient and weigh it, and then hit a button, add another ingredient along with the first and weigh it again. You can do this over and over, it will be completely accurate, and this allows you to use the cup as a mixing bowl. 



Top-Brewer:


 All the work happens below the counter, A couple of taps of your iPhone, and out of the spout comes a latte, espresso, or whatever else you fancy. It is a bit like a Danish version of something you might find at Wonka's Factory. The price, which can easily soar over $15,000, makes this ultra-cool product attainable for very few.

EatSmart Nutrition Pro Scale:


 Back in the world of affordable kitchen technology is this EatSmart Nutrition Pro Scale which not only weighs your food but tells you the nutritional content of pretty much anything you dare to put on it. Calories, crabs, fiber, and more appear in the digital window. It can even keep a daily log of what you are eating.


Williams-Sonoma's Smart Tools for iPad:


For many home cooks (myself included), their newest hi-tech gadget is their iPad. iPads make a world of recipes and online resources available to their flour-dusted fingertips. But propping up the i Pad can be a little awkward and that aforementioned flour sure does make a mess. Williams-Sonoma to the rescue with their Smart Tools which include a stand, a shield, and even a Bluetooth speaker for listening to music (either from the i Pad or any other portable music player.) Need to ask Aunt Betty for an old family recipe? The speaker also has speakerphone capability making video chatting a breeze.


Samsung Refrigerator With LCD Digital Display:


Samsung makes great refrigerators when it comes to keeping things organized and, well, cold. This one can keep your life organized too, with access to your Google calendar. It can also play a slideshow of your little ones, tell you what the forecast is, give you the news, and has every Epicurus recipe at the ready. Don't worry, it is also great at keeping things cold.

Apps to Find Lost Things :)

Cobra Tag:

A Cobra Tag sensor is attached to your keys, purse, computer bag, or any other item you want to protect from loss. The sensor communicates with the phone’s free app and will remind you if you leave your phone or valuables behind.


Stick-N-Find:

About the size of a quarter, Stick-N-Find Bluetooth Stickers can be easily stuck on many things, and then found with your smartphone.


QR Codes:

If you are always losing things, or just hate the idea of having to buy another one of your stuff,  put QR codes on them.These QR codes can help you retrieve your things easily and safely.

BiKN:

A simple piece of hardware that tethers your phone to anything you don't want to lose: your keys, your wallet, your cat, even your kids.


FOFA: Find One, Find All:

Tired of looking for your keys? Once FOFA(foh-fah) Key Finders are attached to your keys and other easy-to-lose things, they can all find, and be found, by each other.  


Tile:

Locate anything you attach a Tile to using the Tile app. It's never been easier to find your keys or wallet.

Microsoft Smart Watch :)

Smart watches from LG , MOTO , Samsung all are hot trending in these days. Microsoft is also standing in the queue. Sources confirmed that Microsoft also entering in this segment. And Latest, It will be releasing  it’s New Microsoft Smart Watch which is released in the month of October . And the hottest deals with it that users not only use smart watch for Windows phone it also works on Android & i OS interface. Microsoft Smart Watch is more slimmer & it is the flatter version of Nike fuel hand along with 11 sensors .

Microsoft Smart Watch  feature:


  • It has heart rate monitor feature.
  • display is on inside the wrist.
  • Devise crosses platform not only for Windows it also work with Android & i OS too.
  • It has 11 sensors under the hood which included Accelerometer , GPS , Microphones etc..
  • It is thinner , Slim , flatter version of Nike Fuel band
  • GPS Navigation on screen.


Musical Jacket :)





 Inventor: 
Burton Snowboards

When the temperature drops, music lovers are often forced to choose between unzipping their jacket, thus exposing themselves to arctic blasts, and listening to the same set of songs over and over until they pray for frostbite. With the Burton AG Clone MD Jacket, you don't have to choose. Designed for snowboarders, the jacket is made with a Sony Mini-Disc and digital music player sewn right into its fabric. The player's controls are touch-sensitive fabric patches on the jacket's sleeve, so you can control the music just by pressing your arm.


The Musical Jacket, first developed in fall 1997, has recently undergone hardware and software improvements, as well as functional updating. A special version was prepared for permanent exhibition at the reconfigured Innovations (Walt Disney World, Orlando), and a new application is being designed for Internet MP3 sound file selection and play. 

Fabric PC :)

 Imagine walking to school or work with a brand-new type of laptop computer in hand. You walk casually, swinging the laptop back and forth between your arms, which is easy, since it weighs well under one pound (0.45 kg) and isn't much thicker than a checkbook. Although it has no carrying case, you hardly blink after dropping it onto the concrete sidewalk. Instead you pick it up, dust it off, and continue on your way. When you arrive at your desk, you toss the laptop down on the table and open it up. The screen immediately unfolds, spreading out into an enormous display!
While this scenario sounds very futuristic, it actually isn't that far from reality, thanks in part to a concept design called a Fabric PC (personal Computer), produced by Fujistu, Inc.
 Amazingly, a Fabric PC won't be encased within a tough metal shell like the PCs that have been around up to this point. Instead, it will be built into a tough but pliable fabric frame. Even the screen will able to bend and fold and will have a thickness and flexibility similar to a laminated sheet of paper.
Experts say it will be available in 2 to 10 years.

Thursday, 25 December 2014

Wireless Keyboard :)

This latest gaming gadget won best wireless keyboard at the Consumer Electronics Association Awards.
The design and engineering award was given to IO GEAR for their wireless keyboard.

The palm size device feature an optical trackball, scroll wheel, LED back light and auto on/off lid cover.

This 2.4 GHZ hand held keyboard allows users to manage their home theaters, PC's, TV or game consoles from any direction up to 33 feet away, whether stationary or mobile, by just plugging in a USB RF receiver.

The California based electronics company is also environmentally conscious and supports green initiatives for integrated technologies, reducing wastes and minimizing energy consumption.

Wednesday, 24 December 2014

Smart Watches :)

Inventor Eric Migicovsky, a 25 years old university of Waterloo graduate, presold 85,000 of his future gadgets for delivery to users later this year.

The pebble is a smart watch that wirelessly connects via Bluetooth to an iPhone or Android smartphone and uses smartphone apps.It's the only smart watch that does so.

The pebble has various applications that allow users to access information or control devices from their wrist.

Besides checking calls, emails, text messaging or social media updates, the smart watch has potentially unlimited applications.

Migicovsky will release an open software development kit for it's pebble technology, which will allow developers to design watch apps similar to what Apple did with its iPhone developer kit.

Current pebble applications include a music control app; a fitness tracker app that monitor stats related to cycling or jogging;a golfing range finder for 25,000 golf courses; and a sensor app that connects with a device you attach to thinks you want to communicate with.

migicovsky developed his prototype from cellphone parts but we used a high resolution, customizable e-paper display, which is a technology that allows the face to be read in direct sunshine or use back lighting when reading in the dark.

Battery life is 7 days and is USB rechargeable. It's a water resistant, vibrates and will be available in red, black or white.It will sell for $125.
 

Cell Phone Watch :)

Cell phone watches operate as a fully functional, fully featured mobile devices with multiple capabilities.

One potential capability is to extend or project a interactive screen onto a body part or other surface.

A cell phone watch conveniently attaches to your wrist and not in your pocket, bag or elsewhere, so these gadgets is do offer some interesting possibilities.Most of these watches feature video and still camera capability.

You would not miss an opportunity to record anything because all of you have to do is point your arm and click.

Features such as touch screen, radio, texting, video/audio recorder-players, handwriting recognition, e-book readers, internet access and call setting options make these watches competitive with phones.

The average talk time for a cell phone watch is about 2-4 hours, stand by is 120-150 hours.Most of these watches have rechargeable batteries and loads of application.

Since Samsung introduced the world's first cell phone watch in 1999, there is more financing and development being done with these future gadget.

If you are thinking of getting one, make sure you review the specifications to ensure your service provider supports the technology your choosing.

Similar to smart phones, different manufacturers use different competing technologies that may not be compatible with your cell phone services.

Tuesday, 23 December 2014

Holographic 3D television :)

New TV technology patented by Apple promises 3D television with a holographic display.

Inventor Christoph H Krah, who also invented Apple's multi-touch applications, describes this new TV technology as an advanced 3d display system that allows user to touch and manipulate holographic images.

This holography technology would also be available on future generation i Pads and other Apple devices.


This new TV technology delivers a holography display without the need for eye-wear or headgear.

 A feedback mechanism also recognize and identifies the proximity, location and movements of potential viewers in real time, and adjust the holographic images for their viewing perspective.

This means that someone passing by , or anyone in the large audience, could see the holographic images as if they were real physical objects floating in space.







E-papers :)

Among the future invention in e-readers is this paper thin, flexible film that reads like a magazine or newspaper.

LG Display , a manufacturer of thin-film transistor liquid crystal display panels has developed an 11.5 inch flexible e-paper display.

The 0.3 mm thick metal foil substrate resembles a traditional newspaper but operates as an e-reader.

The GIP (Gate-in-Panel) technology promises to be the next generation in
digital display technology competing in the e-book market.


E-paper's ultra-thin, flexible and lightweight from reduces maintenance and power consumption costs but its scalable size encourages additional applications such as mounting to flat and curved surfaces like walls and pillars.

Monday, 22 December 2014

Lacie Safe :)

This computer invention provides peace of mind for securing your information.

Storing your file on this mobile hard drive gives you multiple levels of protection because it uses advanced encryption and biometric authentication technology.

The safe uses 128-bit AES encryption (Advenced encryption center) which is the same standard used by governments to protect top secret information. 

Encryption converts information that is readable into a mixture of unreadable characters.Decryption processes the encrypted unreadable characters back into readable format.

The algorithm that encrypts and decrypts the information is known as a "Cipher". The cipher allows access to the readable information when you enter a password.

Most cipher will use password that are four to eight characters in length, but a 128-bit AES cipher uses a 16 character password which is extremely difficult to hack.

 The AES cipher or "Rijndael" pronounced as Rein Dahl is named after the Belgian inventor John Daemen and Vincent Rijmen.

Biometric authentication is a technology that recognizes physical or behavioral characteristics such as fingerprints, palm geometry, retina patterns, voice and signature. Fingerprints recognition is the most popular because it's easier to use.

Your finger is scanned for minutia, which are the points on a fingerprints where a ridge ends or splits into two. An algorithm extracts the minutia points and creates a template image that is used for authentication.








Cloud Computing :)

that will replace how we currently use our computers and software applications. - See more at: http://www.inventor-strategies.com/computer-invention.html#sthash.o7hQAu3o.dpuf
Cloud computing is the term used to describe technology that will replace how we currently use our computers and software applications.
The concept of cloud computing is that any device (computer invention) connected to the internet can utilize a network of computing resources.
- See more at: http://www.inventor-strategies.com/computer-invention.html#sthash.o7hQAu3o.dpuf
Cloud computer is the term used to describe technology that will replace how we currently use our computers and software applications.

The concept of cloud computing is that any device connected to the internet can utilize a network of computing resources.

This would introduce infrastructure, application and storage for far less than what it would cost to use your own hardware , software and resources.

Additionally it allows users to have access to application that they would  not have otherwise.Access is as simple as using an interface application or just a web browser from any location.

The cloud can allow access to millions of computer in an intelligent ,scalable and redundant system with expert support.

Similar to outsourcing, the difference and advantages of cloud computing are speed, efficiency capability and cost, particularly with the increasing popularity of smart phones and tablets.

It allows users to work from anywhere, to perform any task with any application, and to pay for only what you use.

Cloud computing is comparable to using email or online banking where you log into your account to access or manage your information.The software, application and storage do not exist on your computer.

But unlike your email or online banking services, clouds can perform complicated engineering tasks, schematics , modelings or mathematical computations, and it can do this in a cost effective and efficient manner.

Another major advantage of cloud computing is the reliability of service.

Servers can crash, temporarily denying you online access to services and data. But cloud computing has multiple servers so you always have access.

Some concerns about the cloud computing are security and the effect it will have on computer industry.

The security concerns are similar to those regarding email and online banking.

These have proven to have reliable security protocols therefore similar advanced technology has been adopted for  cloud computing.

It's anticipated that computer repair and maintenance, as well as IT employment /contracts will steadily decline as cloud computing rises in popularity.

There has been a proliferation of free public clouds appearing on the internet.

These services, often referred to as SAAS (software as a service) are easy to use, fast,reliable and very good.

 You can increase use of  cloud computing to meet a high demand on your resources and you can reduce your usage during low demand.This allows you to adapt to changing conditions without making significant long term investments in personnel, computers, software and operational costs.

Hopefully, cloud computing will assist independent inventors and small business to be more efficient and cost effective.

At the very least, it is a leveling of  the playing field.


, to perform any task with any application, and to pay for only what you use.
Cloud computing is comparable to using email or online banking where you log into your account to access and manage your information. The software, applications and storage do not exist on your computer.
But unlike your email or online banking services, clouds can perform complicated engineering tasks, schematics, modeling or mathematical computations, and it can do this in a cost effective and efficient manner.
Another major advantage to cloud computing is the reliability of service.
Servers can crash, temporarily denying you online access to services and data. But cloud computing has multiple servers so you always have access.
Some concerns about cloud computing are security and the effect it will have on the computer industry.
The security concerns are similar to those regarding email and online banking.
- See more at: http://www.inventor-strategies.com/computer-invention.html#sthash.XGAi4L8l.dpuf

Additionally, it allows users to have access to applications that they would not have otherwise. Access is as simple as using an interface application or just a web browser from any location. - See more at: http://www.inventor-strategies.com/computer-invention.html#sthash.o7hQAu3o.dpuf
Additionally, it allows users to have access to applications that they would not have otherwise. Access is as simple as using an interface application or just a web browser from any location. - See more at: http://www.inventor-strategies.com/computer-invention.html#sthash.o7hQAu3o.dpuf

Saturday, 20 December 2014

Quantified Self (Predictive Analytics)

The quantified-self movement has existed for many years as a collaboration of people collecting continual data on their everyday activities in order to make better choices about their health and behaviour. But, with today’s Internet of Things, the movement has begun to come into its own and have a wider impact.
Smartphones contain a rich record of people’s activities, including who they know (contact lists, social networking apps), who they talk to (call logs, text logs, e-mails), where they go (GPS, WiFi, and geotagged photos) and what they do (apps we use, accelerometer data). Using this data, and specialized machine-learning algorithms, detailed and predictive models about people and their behaviours can be built to help with urban planning, personalized medicine, sustainability and medical diagnosis.
For example, a team at Carnegie Mellon University has been looking at how to use smartphone data to predict the onset of depression by modelling changes in sleep behaviors and social relationships over time. In another example, the Live hoods project, large quantities of geotagged data created by people’s smartphones (using software such as Instagram and Foursquare) and crawled from the Web have allowed researchers to understand the patterns of movement through urban spaces.
In recent years, sensors have become cheap and increasingly ubiquitous as more manufacturers include them in their products to understand consumer behaviour and avoid the need for expensive market research. For example, cars can record every aspect of a person’s driving habits, and this information can be shown in smartphone apps or used as big data in urban planning or traffic management. As the trend continues towards extensive data gathering to track every aspect of people’s lives, the challenge becomes how to use this information optimally, and how to reconcile it with privacy and other social concerns.

Screenless display :)

One of the more frustrating aspects of modern communications technology is that, as devices have miniaturized, they have become more difficult to interact with – no one would type out a novel on a smartphone, for example. The lack of space on screen-based displays provides a clear opportunity for screenless displays to fill the gap. Full-sized keyboards can already be projected onto a surface for users to interact with, without concern over whether it will fit into their pocket. Perhaps evoking memories of the early Star Wars films, holographic images can now be generated in three dimensions; in 2013, MIT’s Media Lab reported a prototype inexpensive holographic colour video display with the resolution of a standard TV.
Screenless display may also be achieved by projecting images directly onto a person’s retina, not only avoiding the need for weighty hardware, but also promising to safeguard privacy by allowing people to interact with computers without others sharing the same view. By January 2014, one start-up company had already raised a substantial sum via Kickstarter with the aim of commercializing a personal gaming and cinema device using retinal display. In the longer term, technology may allow synaptic interfaces that bypass the eye altogether, transmitting “visual” information directly to the brain.
This field saw rapid progress in 2013 and appears set for imminent breakthroughs of scalable deployment of screenless display. Various companies have made significant breakthroughs in the field, including virtual reality headsets, bionic contact lenses, the development of mobile phones for the elderly and partially blind people, and hologram-like videos without the need for moving parts or glasses.

Friday, 19 December 2014

Brain Computer Interface :)


The ability to control a computer using only the power of the mind is closer than one might think. Brain-computer interfaces, where computers can read and interpret signals directly from the brain, have already achieved clinical success in allowing quadriplegics, those suffering “locked-in syndrome” or people who have had a stroke to move their own wheelchairs or even drink coffee from a cup by controlling the action of a robotic arm with their brain waves. In addition, direct brain implants have helped restore partial vision to people who have lost their sight.
Recent research has focused on the possibility of using brain-computer interfaces to connect different brains together directly. Researchers at Duke University last year reported successfully connecting the brains of two mice over the Internet (into what was termed a “brain net”) where mice in different countries were able to cooperate to perform simple tasks to generate a reward. Also in 2013, scientists at Harvard University reported that they were able to establish a functional link between the brains of a rat and a human with a non-invasive, computer-to-brain interface.
Other research projects have focused on manipulating or directly implanting memories from a computer into the brain. In mid-2013, MIT researchers reported having successfully implanted a false memory into the brain of a mouse. In humans, the ability to directly manipulate memories might have an application in the treatment of post-traumatic stress disorder, while in the longer term, information may be uploaded into human brains in the manner of a computer file. Of course, numerous ethical issues are also clearly raised by this rapidly advancing field.

Wednesday, 17 December 2014

World's "Thinnest" smartphone :)

 X5max

 Chinese smartphone maker Vivo has launched the X5Max, a smartphone that measures just 4.75mm in thickness in India at Rs 32,980.

The phone claims to be the world's slimmest smartphone, taking over Oppo's recently launched R5 and Gionee's Elife.
Vivo X5Max sports an aluminium frame and features a 5-inch full-HD (1080x1920p) Super AMOLED display. Powered by a 64 bit Qualcomm Snapdragon 615 octal core chip (1.7GHz Cortex-A53 quad core + 1GHz Cortex-A53 quad core) and 2GB RAM, the phone has 16GB internal storage expandable up to 128GB via microSD card.

It runs Android 4.4 KitKat with Vivo's custom skin, FuntouchOS running on top. In terms of connectivity, the dual-sim phone supports 3G, 4G (including TDD-LTE, Indian 4G bands), Bluetooth 4.0 and GPS.
The phone will be available in China starting December 22 at CNY 2,998 (roughly Rs 30,000). 

Intel preps new Technology to secure credit cards and transaction


Swiping credit cards or using payment systems like Apple Pay at stores could become much safer thanks to a new Intel system, which could also make it easier for retailers to secure data after transactions are completed. 
Intel has developed Data Protection Technology for Transactions, a hardware-software bundle designed to protect credit card and personal data from hackers when transactions are being authorized. 
Intel's hardware and software security platform is adaptable to multiple payment systems. It will be supported on the latest Atom and Core processors.

Working: 

Once a credit card transaction is made at a payment terminal, Intel's technology creates multiple layers of security to protect data. A POS terminal encrypts the data, which is transferred through a private tunnel to the credit-card processing company and ultimately to the bank authorizing the transaction.
Bundling on multiple layers of security minimizes the risk of data getting intercepted in the course of paying for products and services, said Bradley Corrion, platform solutions architect at Intel.
The technology can also be used to protect the transfer of customer information to data centers, where analytic and business intelligence applications can be used to identify buyer trends.

Saturday, 1 November 2014

Adobe Photoshop 7.0 :)

Adobe Photoshop:

Photoshop is a graphics editing program by Adobe that is used by professionals and regular consumers.This program can be used to create images from scratch or to alter existing images. Photoshop skills are useful and can lead to gainful employment.

Tools Of Adobe Photoshop:

Rectangular Marquee Tool (M):

Use this tool to make selections on your image, in a rectangular shape.

Move Tool (V):

Use this tool to, well, move things.


 

Polygon Lasso Tool (L):

Use this to draw selections in whatever shape you would like.

Magic Wand Tool (W):

Use this to select a color range. It will select the block of color, or transparency, based on wherever you click.

Crop Tool (C):

The Crop Tool works similarly to the Rectangular Marquee tool. The difference is when you press the [Enter/Return] key, it crops your image to the size of the box.

Slice Tool (K):

This is used mostly for building websites, or splitting up one image into smaller ones.

Healing Brush Tool (J):

This is a really useful tool.You can use this tool to repair scratches and stuff like that on images. It works like the Brush tool.

Brush Tool (B):

It paints one your image, in whatever color you have selected, and whatever size you have selected. There’s a lot of options for it, but this is basic .

Clone Stamp Tool (S):

This is very similar to the Healing Brush Tool.You use it the exact same way, except this tool doesn’t blend at the end. It’s a direct copy of the information from the first selected area to the second.

History Brush Tool (H):

This tool works just like the Brush Tool except the information that it paints with is from the original state of your image.We can reverse history with the help of this tool.

Eraser Tool (E):

This is the anti-Brush tool. It works like an eraser and erases whatever information wherever you click and drag it.

Gradient Tool (G):

You can use this to make a gradiation of colors.It creates a blending of your foreground color and background color when you click and drag it.


Blur Tool (R):

  It makes things blurry.

Dodge Tool (O):

It’s actually used to lighten whatever area you use it on. As long as it is not absolute black.

Path Selection Tool (A):

You use this tool when working with paths.

Horizontal Type Tool (T):

It makes type or text.
Pen Tool (P):
It’s for creating paths, in which you would use the Path Selection Tool to select the path.

Rectangle Tool (U):

By default it draws a Shape Layer in the form of a rectangle.

Notes Tool (N):

You can use this tool to add small little note boxes to your image. These are useful if you’re very forgetful or if you’re sharing your Photoshop file with someone else. I’m pretty sure it only works with .PSD files.

Eyedropper Tool (I):

This tool works by changing your foreground color to whatever color you click on.

Hand Tool (T):

It’s for moving your entire image within a window. So if you’re zoomed in and your image area is larger than the window, you can use the Hand Tool to navigate around your image.


Zoom Tool (Z):

It allows you to zoom into your image. Don’t be dumb, it doesn’t actually change the size of your image.

BONUS!!:

These are your color boxes. Foreground (in the front) and Background (in the back). Click on either one to bring up the color select dialog box.