Posts tagged as: tech

store

Thursday, September 13, 2007

 

Cancer doubt remains over mobiles

‘The long-term cancer risk of mobile phone use cannot be ruled out, experts have concluded.

A major six-year research programme found a “hint” of a higher cancer risk.

But the UK Mobile Telecommunications and Health Research Programme (MTHRP) did rule out short-term adverse effects to brain and cell function.

Researchers are now expanding the programme to look at phone use over 10 years, and the specific impact on children, which has not been studied.’


api

Wednesday, September 12, 2007

 

Chip Implants Linked to Animal Tumors

‘When the U.S. Food and Drug Administration approved implanting microchips in humans, the manufacturer said it would save lives, letting doctors scan the tiny transponders to access patients’ medical records almost instantly. The FDA found “reasonable assurance” the device was safe, and a sub-agency even called it one of 2005’s top “innovative technologies.”

But neither the company nor the regulators publicly mentioned this: A series of veterinary and toxicology studies, dating to the mid-1990s, stated that chip implants had “induced” malignant tumors in some lab mice and rats. [..]

Leading cancer specialists reviewed the research for The Associated Press and, while cautioning that animal test results do not necessarily apply to humans, said the findings troubled them. Some said they would not allow family members to receive implants, and all urged further research before the glass-encased transponders are widely implanted in people.’


Zombie Pfizer Computers Spew Viagra Spam

‘Computers inside pharmaceutical giant Pfizer’s network are spamming the internet with e-mails touting the company’s flagship erectile-enhancement drug Viagra, along with ads for knockoff Rolexes and shady junk stocks.

But the e-mails are not part of Pfizer’s official marketing efforts.

Pfizer’s computers appear to have been infected with malware that has transformed them into zombie computers sending spam at the behest of a hacker. Oddly enough, they are spamming the public’s inboxes with ads for the company’s own product.

“There is a disaster inside this company, and they don’t know it,” says Rick Wesson, CEO of Support Intelligence — a small San Francisco-based security company that alerted Wired News to the problem.’


Meet IvanAnywhere

‘Programmer Ivan Bowman spends his days at iAnywhere Solutions Inc. in much the same way his colleagues do.

He writes code, exchanges notes in other developers’ offices, attends meetings and, on occasion, hangs out in the kitchen or lounge over coffee and snacks.

About the only thing he can’t do is drink the coffee or eat the snacks — or touch anything, for that matter.

It’s not that Bowman doesn’t have hands or a mouth; they’re just in Halifax, along with the rest of his body.

In fact, it’s not really Bowman in the Waterloo office at all. It’s IvanAnywhere, a robot Bowman uses to interact with his colleagues in Waterloo from his home office 1,350 kilometres away. [..]

The computer screen displays a live shot of Bowman’s face from his living room in Nova Scotia. [..]

When Bowman has a question for a colleague, he doesn’t pick up the phone; he uses his joystick to drive his doppelganger to the team member’s office.’


careers

Friday, September 7, 2007

 

Immaculate Backup

‘Murphy’s Law 198§44: the more complete a backup/recovery solution becomes, the less likely it is to ever be used.

With nearly half a century of experience using computers to run their business, Chris M’s company knew that law all too well. Ever since that fateful Wednesday — still known throughout the company as The Crash of ‘68 — they swore, Never Again. And forty years later, they’ve kept their promise.’


site-map

When the Query String Is Just Not Enough

‘As Stephen A.’s client was walking him through their ASP.NET site, Stephen noticed a rather odd URL scheme. Instead of using the standard Query String — i.e., https://their.site/Products/?ID=2 — theirs used some form of URL-rewriting utilizing the “@” symbol in the request name: https://their.site/Products/@ID=2.aspx. Not being an expert on Search Engine Optimization, Stephan had just assumed it had something to do with that.

A few weeks later, when Stephan finally had a chance to take a look at the code, he noticed something rather different…’


copyright

Thursday, September 6, 2007

 

A Secure and Well-Ventilated Location

‘A major part of Don Q’s job is to fly out to construction sites and setup their computer network. Weeks before doing this, Don meets with the project manager to make sure that every one knows what needs to be done and how to do it. It’s up to the project manager to make sure that the workstations, server, cabling, power, etc. are all in place before Don arrives, and Don makes sure to give concise but not insultingly-simple instructions on how to accomplish that. One of these tasks is simply: install the server in a secure and well-ventilated location.’


privacy

Wednesday, September 5, 2007

 

How to Untangle MP3 Player Headphones

(3.7meg Flash video)

see it here »


contact

Toast Printer


Tuesday, September 4, 2007

 

Oops, another top secret exposed

‘A man looking for a new home on an online mapping service has stumbled across an aerial image of a US nuclear-powered submarine in dry dock showing a part of the vessel that wasn’t meant to be seen.

The image – which appears on Microsoft’s Virtual Earth mapping service – is of the seven-bladed propeller used on an Ohio class ballistic missile submarine.

The vessel was being worked on at a dry dock at the Naval Base Kitsap-Bangor in Washington State, in the north-west of the United States. The base is part of Bangor’s Strategic Weapons Facility Pacific which houses the largest nuclear weapons arsenal.

Propeller designs have been closely guarded secrets since the days of the Cold War. It is still common for them to be draped with tarps or removed and covered when a submarine is out of the water.

The propeller design is an integral part of a submarine’s ability to remain undetected during operations, ensuring that it can patrol the seas in stealth without giving its position away to surface ships.’


Flight Simulator Keyboard Controls – Google Earth User Guide

‘This document describes the various keyboard combinations that you can use with the flight simulator features of Google Earth. To enter the flight simulator mode, press Ctrl + Alt + A (Command/Open Apple Key + Option + A on the Mac). Once you have entered flight simulator mode for the first time, you can re-enter the mode by choosing Tools > Enter Flight Simulator. To leave flight simulator mode, click Exit Flight Simulator in the top right corner or press Ctrl + Alt + A (Command/Open Apple Key+ Option + A on the Mac).’


Senate blocks mandatory ID implants in employees

‘Tackling a dilemma right out of a science fiction novel, the state Senate passed legislation Thursday that would bar employers from requiring workers to have identification devices implanted under their skin.

State Sen. Joe Simitian (D-Palo Alto) proposed the measure after at least one company began marketing radio frequency identification devices for use in humans.

The devices, as small as a grain of rice, can be used by employers to identify workers. A scanner passing over a body part implanted with one can instantly identify the person.

“RFID is a minor miracle, with all sorts of good uses,” Simitian said. “But we shouldn’t condone forced ‘tagging’ of humans. It’s the ultimate invasion of privacy.”‘


store

North Korea Cracks Down on ‘Korean Wave’ of Illicit TV

‘Authorities in North Korea are intensifying a crackdown on imports of South Korean popular culture, especially television dramas, but the South’s “Korean Wave” may already have taken a strong hold in the isolated Stalinist state.

South Korean music, soap operas, and movies have already taken the rest of East Asia by storm, and, according to North Koreans now living in the South, the South’s arch-rival North Korea is no exception. [..]

“There have been two or three reports of public executions of North Korean young people in major cities including Chungjin, as punishment for having illegally copied and distributed South Korean visual material,” said Kang Chul Hwan, vice-chairman of the Seoul-based Committee for the Democratization of North Korea.

“It is not an overstatement to say that the Kim Jong Il regime is waging war on the South Korean TV drama,” he said, adding that the North Korean authorities have intensified surveillance and searches to prevent South Korean videos from entering North Korea.’


api

Sunday, September 2, 2007

 

Toothbrush with ‘satnav’

‘A new hi-tech toothbrush has been launched with built-in “satnav”.

Maker Oral B claim that as you clean your teeth it transmits information by radio to a separate miniature display screen, telling you where you should clean.

It also tells you how long you should brush for and if you’re brushing too hard or not hard enough, reports the Daily Mail.

The manufacturers are hoping their new gizmo – called Triumph with SmartGuide – is going to be this year’s Christmas must-have in the bathroom.

It comes with a wireless LCD display which can be stuck on to the shaving mirror.’


Over 5000 ‘net cafe refugees’ in Japan

‘Internet cafes and “manga” comic cafes are omnipresent in urban Japan, offering couches, computers, soft drinks and comic books to stressed businessmen or commuters who missed their trains home.

But a government survey found that an estimated 5400 people have virtually moved in to the 24-hour cafes.

It said some 80 per cent of Japan’s “net cafe refugees” are men and that 52.7 per cent said they decided to live in the lounges because they lost their jobs.

Another 13.8 per cent said they moved into the net cafes because of deteriorating relationships with their families, according to the survey by the health and welfare ministry.’


China seeks to ‘limit game hours’

‘The Chinese government has clamped down on the amount of time youngsters can spend playing online games, according to the official news agency Xinhua.

Under-18s who play for more than three consecutive hours a day will have limits imposed on the amount of points they can score, the agency reported. [..]

Chinese gaming firms such as NetEase and Shanda Interactive Entertainment have until 15 July to install software which will halve the number of points gamers can score if they play for more than three hours, said the report.

Determined gamers who play for more than five hours will get no points at all and face an on-screen warning that they are entering “unhealthy game time”.’


careers

Court orders movie pirate to switch to Windows

‘Chalk up another new-found power to the Motion Picture Association of America: the ability to force someone to change operating systems. Scott McCausland, who pleaded guilty last September in 2006 to the crime of uploading Star Wars: Episode III to the site Elitetorrents.com, was charged with “conspiracy to commit copyright infringement” and “criminal copyright infringement” by the FBI. This charge carried a maximum sentence of five years in prison, a fine of $250,000, and three years of supervised release. He wound up serving five months in prison and is now on probation. The probation, however, has now taken a strange turn into forced platform advocacy.

“I had a meeting with my probation officer today and he told me that he has to install monitoring software onto my PC. No big deal to me; that is part of my sentence,” he wrote on his Lost and Alone blog. “However, their software doesn’t support GNU/Linux (Which is what I use). So, he told me that if I want to use a computer, I would have to use an OS that the software can be installed on.” The monitoring software in question is only available for Microsoft Windows. Neither Linux nor a Macintosh running OS X would be an acceptable platform.’


site-map

Saturday, September 1, 2007

 

Thousands join Facebook group to help find beauty featured on lost digital camera

‘The good news for this mystery blonde is that the digital camera she mislaid on holiday has been found.

The bad news is that the revealing pictures of herself stored on its memory card have been posted on the internet.

And since then she has attracted over 23,000 admirers, all professing their desperation to track her down so that she can get back her lost property. [..]

The Facebook group description reads: “We are trying to track down the lovely lass in these photos so she can be reunited with her lost digital camera. She certainly knows how to use it!’

Update: Also the NSW pictures and her MySpace page.


copyright

Microsoft Tech Support

‘A helicopter with a pilot and a single passenger was flying around above Seattle when a malfunction disabled all of the aircraft’s navigation and communications equipment. Due to the darkness and haze, the pilot could not determine the helicopter’s position and course to get back to the airport.

The pilot saw a tall building with lights on and flew toward it, the pilot had the passenger draw a handwritten sign reading “WHERE AM I?” and hold it up for the building’s occupants to see.

People in the building quickly responded to the aircraft, drew a large sign, and held it in a building window. Their sign said “YOU ARE IN A HELICOPTER.”‘


privacy

Friday, August 31, 2007

 

Bionic Arm Powered by Rockets

‘Rockets can help power robotic arms, which could help lead to “better, stronger, faster” bionic limbs, research now reveals.

A new prototype rocket-powered mechanical arm can lift about 20 to 25 pounds—three to four times more than current commercial prosthetic arms—and can do so three to four times faster.

“Our design does not have superhuman strength or capability, but it is closer in terms of function and power to a human arm than any previous prosthetic device that is self-powered and weighs about the same as a natural arm,” said researcher Michael Goldfarb, a roboticist at Vanderbilt University in Nashville.

“It has about 10 times as much power as other [robotic] arms,” Goldfarb said.’


contact

In Japan, it’s all games until you break an arm

‘Lose a game of chess to a computer, and you could bruise your ego. Lose an arm-wrestling match to a Japanese arcade machine, and you could break your arm.

Distributor Atlus said Tuesday it will remove all 150 Arm Spirit arm wrestling machines from Japanese arcades after three players broke their arms grappling with the machine’s mechanized appendage.

“The machine isn’t that strong, much less so than a muscular man. Even women should be able to beat it,” said Atlus spokeswoman Ayano Sakiyama, calling the recall “a precaution.”

“We think that maybe some players get overexcited and twist their arms in an unnatural way,” she said. The company was investigating the incidents and checking the machines for any signs of malfunction.’


Taliban terrorises RAF families

‘Taliban fanatics terrorised the wife of an RAF officer by phoning her and saying: “You’ll never see your husband alive — we have just killed him.”

Rebels in Afghanistan are targeting British forces’ families with hate calls after tapping into Our Boys’ mobile phones.

The tearful wife rang the RAF fearing the worst after receiving the midnight call — and was told her husband was safe and well.

But the Taliban calls are a sick new plot to destroy morale, and British forces in Afghanistan have now been BANNED from using mobiles.

Army chiefs believe extremists are using sophisticated eavesdropping equipment to trace home numbers when forces call their loved ones in Britain.’


Student cracks Government’s $84m porn filter

‘A Melbourne schoolboy has cracked the Federal Government’s new $84 million internet porn filter in minutes.

Tom Wood, 16, said it took him just over 30 minutes to bypass the Government’s filter, released on Tuesday.

Tom, a year 10 student at a southeast Melbourne private school, showed the Herald Sun how to deactivate the filter in a handful of clicks.

His technique ensures the software’s toolbar icon is not deleted, leaving parents under the impression the filter is still working. [..]’


Saturday, August 25, 2007

 

Boy Nearly Killed Trying To Cool Xbox 360

‘A 14 year old boy from Brevard, North Carolina was nearly killed Sunday while trying to stop his Xbox 360 from overheating.

The boy’s mother told local news that his Xbox 360 kept turning itself off after about 5 minutes. Her son had read online that he could stop it from cutting off by cooling the power supply. “I saw him put the cord on top of a box in the living room”, said the boy’s mother. “When I left to go next door he was playing a game but when I got back he was laying on his back on the floor and unconscious”.

While his mother was away the boy had taken the power supply and wrapped it in plastic and tape. In an attempt to cool it off, he submerged it into a pan of water with the cord still plugged in. The boy had regained consciousness by the time paramedics had arrived. He was taken to the Transylvania CommunityHospital in Brevard where he spent the night.’


store

Friday, August 24, 2007

 

Hackers Take Down the Most Wired Country in Europe

‘The minister of defense checked the Web page again — still nothing. He stared at the error message: For some reason, the site for Estonia’s leading newspaper, the Postimees, wasn’t responding. Jaak Aaviksoo attempted to pull up the sites of a couple of other papers. They were all down. The former director of the University of Tartu Institute of Experimental Physics and Technology d been the Estonian defense minister for only four weeks. He hadn’t even changed the art on the walls.

An aide rushed in with a report. It wasn’t just the newspapers. The leading bank was under siege. Government communications were going down. An enemy had invaded and was assaulting dozens of targets.

Outside, everything was quiet. The border guards had reported no incursions, and Estonian airspace had not been violated. The aide explained what was going on: They were under attack by a rogue computer network.’

Followup to Russia accused of unleashing cyberwar to disable Estonia.


api

Tuesday, August 21, 2007

 

Texting Man Avoids One Train, Struck By Another

‘A man sending a text message avoided being hit by a train going in one direction only to be struck by another train, reported WLWT-TV in Cincinnati.

Witnesses told police the man was looking down at his cell phone as he crossed some railroad tracks around 9 a.m. in Elmwood Place.

Witnesses said the man waited for a southbound train to pass, put his head down and started walking across the tracks.’


Tiny wind engines cool computers

‘Minuscule wind engines could help to take computing power to the next level, scientists believe.

US researchers have developed a prototype device that creates a “breeze” made up of charged particles, or ions, to cool computer chips.

The “ionic wind”, the scientists say, will help to manage the heat generated by increasingly powerful, yet ever-shrinking devices. [..]

“A 250% improvement (3.5 times the cooling rate of a conventional fan) is quite unusual.”‘


Sunday, August 19, 2007

 

A Cellphone Powered by Urine

‘Physicists in Singapore have developed a battery that can be powered by human urine. Aimed at disposable health-care kits for use in rural areas, we naturally couldn’t pass up the opportunity to comment on such a product being used for those “emergency” phone calls when your conventional battery had died. Led by Dr Ki Bang Lee, a team at Singapore’s Institute of Bioengineering and Nanotechnology developed a paper battery which is designed to be cheap to produce, and use urine as its power charge source.

Using 0.2 ml of urine, the team were able to generate a voltage of around 1.5 Volts with a corresponding maximum power of 1.5 mW. Battery performance can also be adjusted by using different construction materials.’


careers

Thursday, August 16, 2007

 

Super solution for Rubik’s cube

‘The ultimate solution to the Rubik’s cube has come closer thanks to hours of number crunching on a supercomputer.

The research has proved that a Rubik’s cube can be returned to its original state in no more than 26 moves.

The supercomputer took 63 hours to crank out the proof which goes one better than the previous best solution. [..]

The study brings scientists one step closer to finding the so-called “God’s Number” which is the minimum number of moves needed to solve any disordered Rubik’s cube.

It is so named because God would only need the smallest number of moves to solve a cube. Theoretical work suggests that God’s Number is in the “low 20s”.’


site-map

Giant Tesla Coil

Apparently this Tesla coil is 15 feet tall, runs at 33 kW and throws lightning 26 feet.

(11.6meg Flash video)

see it here »


copyright