Solar System Exploration

A discovery about the moon made in the 1960s is helping researchers unlock secrets about Earth's ocean today.

By applying a method of calculating gravity that was first developed for the moon to data from NASA's Gravity Recovery and Climate Experiment, known as Grace, JPL researchers have found a way to measure the pressure at the bottom of the ocean. Just as knowing atmospheric pressure allows meteorologists to predict winds and weather patterns, measurements of ocean bottom pressure provide oceanographers with fundamental information about currents and global ocean circulation. They also hold clues to questions about sea level and climate. Oceanographers have been measuring ocean bottom pressure for a long time, but the measurements have been limited to a few spots in a huge ocean for short periods of time, says JPL oceanographer Victor Zlotnicki.

Launched in 2002, the twin Grace Satellites map Earth's gravity field from orbit 500 kilometers (310 miles) above the surface. They respond to how mass is distributed in the Earth and on Earth's surface -the greater the mass in a given area, the stronger the pull of gravity from that area. The pressure at the bottom of the ocean is determined by the amount of mass above it. Ocean bottom pressure is the sum of the weight of the whole atmosphere and the whole ocean," says Zlotnicki. When winds move water on the surface, ocean bottom pressure changes. When glaciers melt and add water to the ocean, the ocean's mass increases and bottom pressure increases, either at one place or globally.

Measuring ocean bottom pressure was one of the things we said we wanted to do from the very beginning of the mission, says Grace Project scientist Michael Watkins, "but it has been a challenge. The signal is very small and hard to detect. Gravity changes over the ocean are miniscule compared to those over land. The ocean is a fluid. It yields to pressure and spreads the effect over a vast area. Nothing in the ocean gives as big a gravity signal as a flooding Amazon River or melting glaciers in Greenland or Alaska , changes that Grace can measure fairly easily, says Watkins. Those hydrology signals are huge in comparison, he says.

However, as the mission progressed, Watkins explains, the science team has found better ways to process Grace Data. And by turning to a technique developed for the lunar world, Grace Researchers are getting the precise measurements of ocean bottom pressure they were hoping for.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

2012 THE END OF FORCE MULTIPLIER ELECTRONIC WARFARE

In December 2012 and possibly many months before the Earth could become bombarded by massive solar flares which will knock out most all satellite electronics and blind the Earth for many years to come until more satellites can be built. But the greatest threat is from the CMEs or coronal mass ejections from the Sun. Solar flares have much less chance of hitting the Earth and their energy is much smaller than a coronal mass ejection. Coronal mass ejections are far more massive and carry much greater energy.

In the late 1800s when the sun was very active the telegraphs of their day were reported to work by themselves without their electric batteries. The crude telegraphs were made out of heavy gauge wires. Our electronics today are extremely fragile and even land based electronics might well be damage extensively from a mega solar flare hitting the Earth or especially a CME or coronal mass ejection.

Mankind will be in the greatest danger in December of 2012. Before this time much of the satellites above the Earth will probably be damaged beyond repair and useless junk in space. But in December the planets align with the Earth and this is when the Sun could send a huge coronal mass ejection aimed directly at the Earth. The shading effect of the planets will be in line with the Earth and a shading effect will funnel any CME directly to Earth.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Marine Technology

Development

The 450t Diciotti has a speed of 20kt and does not require refuelling up to 3,000nm. The ship is fitted with one emergency generator along with two Fincantieri FCP propellers. It has one 10m-long interceptor, a rigid hull inflatable boat (RHIB), one 5m service boat and one bow thruster. It takes up maritime patrol operations up to sea state 5 and has withstanding capabilities up to sea state 7.

The Maltese Navy replaced its Kondor Class offshore patrol vessel with Diciotti in 2005. The vessel, named P61, was modified to be capable of refuelling light and medium helicopters.

It also provides the helicopters with a daytime landing facility. P61 project was a €17m project funded by the fifth Italo-Maltese Financial Protocol.

Features

The Saettia MK4 is the fourth variant of a missile attack boat that was originally built as a demonstrator and turned into an offshore patrol vessel for the Italian coastguard.

The Fincantieri has also supplied the systems and components for propulsion of each of the vessels. Key elements of this include the Isotta Fraschini V1716T2MSD engines with power of 2,360kW. The company has also supplied the shaft lines and variable pitch propellers.

Electric power generation is supplied by three Isotta Fraschini L1306T3ME generators with power of 220kW and Fincantieri-supplied stabilisers.

Saettias are an improved version of the Diciotti as they have a longer length and greater power. Iraq's version is 53.4m and has a breadth of 8.1m. Two shafts are used, instead of the original four, and the hull lines have been reformed to result in a reduced operating speed.

The vessels have two navigation-and-search radars lightly armed with two machine guns and an Oto Melara 30mm gun. In addition, they feature a Marlin WS (Modular Advanced Remotely-Controlled Lightweight Weapon Station) mount, with an optronic fire-control system.

For More Technology News

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Food Technology

Technology-Agriculture

Technology and Agriculture

Food is a mixture of many different chemical components. The study of food technology involves an understanding of the changes that occur in these components during food preparation. Many physical and chemical reactions occur during food preparation. These reactions may be a result of the interaction between components, with the medium of cooking, and the environmental conditions such as heat, cold, light and air to which they are subjected during cooking. It also includes understanding the nutritive value of different foods and methods of preserving them during cooking.

Groups of food

The six major components of food are carbohydrates, proteins, fats, minerals, vitamins and water. To maintain good health, ingesting a diet containing these nutrients in correct amounts is essential. A balanced diet is one which contains different types of foods in such quantities and proportions so that the need for calories, proteins, minerals and vitamins is adequately met and a small provision is made for extra nutrients to withstand short duration of leanness. Nutritionists have grouped foods depending upon the nutrient content.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hackers Put Twitter in Crosshairs

Hackers Put Twitter in Crosshairs

Web sites such as Twitter are becoming increasingly favored by hackers as places to plant malicious software in order to infect computers, according to a new study covering Web application security vulnerabilities.

Social-networking sites were the most commonly targeted vertical market according to a study of hacking episodes in the first half of the year. The study is part of the latest Web Hacking Incidents Database (WHID) report, released on Monday. In 2008, government and law enforcement sites were the most hit vertical.

Social networks are "a target-rich environment if you count the number of users there," said Ryan Barnett, director of application security research for Breach Security, one of the report's sponsors, which also includes the Web Application Security Consortium.

Twitter has been attacked by several worms, and other social-networking platforms such as MySpace and Facebook have also been used to distribute malware. That's often done when an infected computer begins posting links on social-networking sites to other Web sites rigged with malicious software. Users click on the links since they trust their friends who posted the links, not knowing their friend has been hacked.

The WHID sample set is small, encompassing 44 hacking incidents. The report only looks at attacks that are publicly reported and those with which have a measurable impact on an organization. The WHID's data set is "statistically insignificant" compared to the actually number of hacking incidents, but shows overall attacker trends, Barnett said.

Other data showed how Web sites were attacked. The most common attack was SQL injection, where hackers try to input code into Web-based forms or URLs (Uniform Resource Locators) in order to get back-end systems such as databases to execute it. If the input is not properly validated -- and malicious code ignored -- it can result in a data breach.

Other methods used include cross-site scripting attacks, where malicious code gets push to on a client machine, and cross-site request forgery, in which a malicious command is executed while the victim is logged into a Web site.

The WHID found that defacing Web sites is still the most common motivation for hackers. However, the WHID includes the planting of malware on a Web site as defacement, which also points to a financial motivation. Hacked computers can be used to send spam, conduct distributed denial-of-service attacks and for stealing data.

Source : tech.yahoo.com

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Technology and Kids

Technology and Kids


Technology and Kids


Technology and Kids


Technology and Kids


Technology and Kids

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

New Technology Computer

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Russian Hackers siege Social Sites to Silence

Thursday morning collateral damage in the ongoing conflict between Russia and Georgia occurred. If you were unable to log on to Twitter or Facebook on that day, you may consider yourself, this is the reason. Twitter and Facebook has confirmed that a pro Georgia blogger was the target of an extensive distributed refutation of service attack that hit the top social networks and other important social sites.

Facebook was able to fend off the assault, but Twitter was very down on Thursday morning, and a blog post indicates that the popular micro blogging service was still dealing with DDoS after that incident i.e. on Friday. Media said that the blogger which is known as ‘Cyxymu' who has named himself after a city in Georgia . The attacks may have been timed to silence Cyxymu's use of his social network accounts to credit the date.

Russian Hacker

Facebook speaker Kathleen Loughlin said that Friday's attack appears to be directed at an individual person who has a presence on a number of sites, rather than the sites themselves. The person is a campaigner blogger and a botnet was directed to request his pages at such a rate that it impacted service for other users. They have cut off the issue, and almost all of our users are able to enjoy the normal Facebook experience.

It is clearly indicates that hackers working for foreign intelligence services. These services may now consider it is a vital start to take down social networks as part of their Web attack strategies.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Green is the new black in wireless companies

samsung reclaimWireless companies Sprint Nextel and Samsung had announced some new products and programs that geared toward environmental sustainability in NEW YORK . The new concept of Green is the new black arises there.

Day before yesterday at the Cooper Hewitt National Museum , the company authorities announced a new eco-friendly device which is named as Reclaim and an overall plan to green the wireless market. The new consumers are regularly increasingly to buying products and get services based on their environmental sustainability. This arises from the energy saving light bulbs to hybrid cars and right now new environment friendly cell phones are all the rage.

avid Owens, Sprint's director of customer acquisitions at the pres meet said that there are many customers who take care so much about the environment. He added that their customers are buying products and get good services from companies. Also they feel it is good company with good sustainable products. Hence they concluded that people will come to Sprint because of their services and products. And then they are trying to make other improvements like network reliability, device line-up, and customer service etc.



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Store Security Breached at GatewayCDI in St. Louis, Missouri.

Mozilla store

Mozilla store

Yesterday Mozilla revealed that a security break had occurred at a third party seller that operates the backend transportation of the Mozilla Store. The break occurred at Gateway CDI, a dispenser of promotional products in St. Louis , Missouri . The Mozilla Store sells various items of software, clothing and other products related to Firefox and some other Mozilla projects.

Mozilla refused to give information about the number of customers whose personal data may have been accessed or to complicate on the situations surrounding the break. Chief marketing officer Mr.Conrad Franey, at Gateway CDI, said that some customer names and passwords were bared, even though, it appears that no credit card information was accessed. He said the attack might come from a hacker who appears to be based in India .

He added that he wasn't ready to provide an approximation number of people affected. He anticipates further information to be released soon about the hacker. Mozilla said that Gateway CDI is get down in the process of investigating about the cause and the level of the break. Affected clients are supposed to be contacted by Gateway CDI. The organization said that Mozilla is devoted to user privacy and the store will be return once again after we have a satisfactory guarantee of continuing login security and data privacy.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Windows 7 XP Mode RC will come soon

Windows 7 XP Mode RC

Windows 7 XP Mode RC

Microsoft Corporation has announced that the Windows 7 will allow users with the proper hardware to run a virtual version of Windows XP by XP Mode, within Windows 7, has entered Release Candidate. Release Candidate, is available from Microsoft's Windows Web site in a downloaded form.

Some new features are available in XP Mode Release Candidate. The special feature of the XP Mode programs is it will now offer users a jump list of recently opened files with that program. The older version of the program didn't have such a feature, hence it is considered as the productivity feature of the new XP mode RC. Also we can launch new programs or files from the windows taskbar itself. This feature is not available in the previous version.

Another feature is we can use the USB devices in XP Mode without having to make it whole screen, it is also access directly from the Windows 7 taskbar. If you want to share the drive between XP Mode and Windows 7 it should be disabled. Tutorial has been created on how to use XP Mode. The users can get the information when he first gets access from the XP Mode installation screen. These criteria are related to the virtualization features of XP in Windows 7.

If you are eager to work with windows 7 RC, you can still do so through the month of August for the testing out the Windows 7 Release Candidate.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

New version to scrap authentication security holes

New version of Firfox

New version of Firfox

Yesterday Mozilla had released two new versions of Firefox browsers. These versions are named as Firefox 3.5.2 and Firefox 3.0.13. These two versions are designed especially to patch two dangerous security holes.

Mozilla Organization members are strongly recommended that all Firefox users should upgrade to this latest release. When a blog posting about the security issue Mozilla said like this.

The first weakness could let an assailant run arbitrary code on a personal computer by sending specially crafted authentication information. This authentication information is called certificate.

The second vulnerability, released last week, involves a fault in certificate authentication technology that could potentially let an assailant increase access to encrypted information otherwise a false issue update to Firefox.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

One billion downloads by Firefox

Firefox
Firefox

At last week Friday, Firefox software crossed the one billion download threshold. It is a especially large number for Mozilla's open source Web browser. Mozilla fans love their highlight, and Mozilla enjoys fanning the flames by providing abundance of opportunities. In 2008 the Firefox Download Day was celebrated with more than 8 million downloads in 24 hours. Mozilla bragged that Firefox downloads surpassed 1 billion on Friday.

Now we have the one billion download figures on the Spread Firefox site. That includes updates people have fetched intentionally, not habitual updates. To maximize the marketing potential, Mozilla also is advertising the 1,000,000,000 + you site. Firefox director said in June that Mozilla estimates that there are 300 million Firefox users; up from 175 million a year earlier, so don't go thinking there are a billion people using it. The total number of users is much more interesting statistic than downloads.

Mozilla has really achieved genuine success, eating progressively into Microsoft Internet Explorer's leading market share to become the 2nd most used browser. The latest version is downloaded between 40 and 60 times a second worldwide at present.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS