Social Icons

Saturday, June 12, 2010

Mobiles & Brain Cancer : WHO Speaks.

1. In an earlier post at http://anupriti.blogspot.com/2009/10/radiation-effects-ur-mobile-quantified.html,wherein the sad and bad effects of using mobiles on brain and health,the quantified SAR ie specific absorption rate were discussed.There is good news for those who always feared using mobile phones for standing at a risk to gain brain cancer in the long run.The WHO study on links between mobile phone use and certain types of brain cancer has proved inconclusive.The researchers said that even though there could be possible health risks from heavy mobile phone use, nothing conclusive has been found as yet.

2. The long ten year study of about 13,000 people focused on both healthy users of mobile phones and those with two types of brain cancer - glioma and miningioma tumors. There were suggestions of an increased risk of glioma, and much less so meningioma, in the users with highest decile (10 per cent) of cumulative call time, in subjects who reported phone use on the same side of the head as their tumor. Strangely though, the study declares these 10 per cent to be people who use their phone to call for more than 30 minutes a day. These stats seem seriously doubtable. Going by it, almost everyone we know is in that 10 percent.

3. However, the study has been criticized, as biased, because mobile phone companies provided 25 percent of the funding.Actually...now it is more then 15 years when the world has been actively using mobiles...more so in india in last 10 years....had it been the other way...how much of the human populi in the world would have been effected by now....

Where does your Website Rank in the web?

1. An interesting free info site for to see what you have done with your website and what you need to do to increase performance of traffic and readers to your website is listed below. The site uses a combination of tools to solve issues or tweak your best techniques used in your web design and content.

2. The name of the site is http://truxtertech.com/siteworth.

Friday, June 11, 2010

Google and Caffeine : The Secret Link

1. A little over year ago ,Google unveiled a “secret project” of “next-generation architecture for Google’s web search“ which was supposed to include crawling, indexing, and ranking changes. While the biggest visible changes in Microsoft’s relaunched search engine, Bing, was user-interface related, Google’s secret project was supposed to be only infrastructure related and proposed no UI changes.

2. Thus after an year of the unveiling,Google is now getting faster and more comprehensive with a new Web indexing system called "Caffeine.As per the Google Blog Post's , the project now stands on completion stage and now "provides 50 percent fresher results for Web searches".


3. The old indexing architecture was based on several layers, some of which were refreshed at a faster rate than others; the main layer would get updated every couple of weeks.To refresh a layer of the old index, entire web was analysed, which meant there was a significant delay between when we found a page and made it available to the user. With Caffeine, the web is analysed in small portions and search index is updated on a continuous basis.Thus more improvement on existing setup....that I say "there is no end to improvement"

Wednesday, June 09, 2010

Securelist.com : Informative attempt by Kaspersky Labs

1. Kaspersky has come up with the launch of a veri informative site on IT security with lots of articles and updates on various types of viruses/malwares etc.You can access the same by clicking here.

2. One interesting section by the name of "Internal threats" is available which should prove popular in future and also "Kaspersky Security Bulletin".

What material Laptops are Made of?

1. Ever wondered what a typical laptop is made up of and where does all that material source to.......read on...it is interesting to know the effort......


China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium, Terbium

Russia: Steel, Ferrite, Ruthenium

Chile: Copper

South Korea: Glass, Cadmium

Australia: Titanium,Nickel

Peru: Indium

India: Barium

Khaidarkhan: Mercury

Canada: Aluminium, Uranium

South Africa: Cadmium, Chromium, Platinum, Manganese

Japan: Stainless Steel, Selenium

Brazil: Silicon, Tantalum

Zimbabwe: Lithium

Congo: Cobalt

Mexico: Bismuth

Tajikistan: Antimony

2. Thanks http://www.sourcemap.org

Tuesday, June 08, 2010

Prisoners all set to est BPO : A first from Cherlapally Central Jail

1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.

2. In a bold & really unique experiment,likely to be the first of its kind in our country,there will soon be BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in Hyderabad@Andhra Pradesh is the first prison throughout the country to have such a unique facility in its premises.These BPO units will have educated convicts serving out their terms. A public-private partnership was signed up between the prison authorities and the Bengaluru based IT firm, Radiant Infosystems.As many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their qualifications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the convicts working there will not have any access to phones as in the case of a normal call centre. They will be mostly involved in bank-related data entry and transfer work.

3. "We found that large number of convicts are willing to work on computers. So, I thought these prisoners can made use of and they can be put on computer-based jobs," said Gopinath Reddy, Director General For Prisons, Andhra Pradesh.

4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS etc...but...worth a start and Idea....

Monday, June 07, 2010

XINGYUN : World's Fastest Computer

1. "Experts say one second of its work may take a whole day for a dual-core personal computer"

2. Such is the astonishing ..or I say beyond imagination power of this officially disclosed SUPERCOMPUTER named "Xingyun" from China that runs at more than one quadrillion (one thousand million million) calculations per second.

3. XINGYUN is now the server of ‘Dawn 6000’ which has been jointly developed by Dawning Information Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomputing Centre. It has been developed for DNA sequencing and for cloud computing.

4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then XINGYUN......wait and watch.....

Monday, May 31, 2010

SHADOWS IN THE CLOUD

1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy to understand...easy english....gr88888 ...


3. Must read for IT Security enthusiasts!!

Tuesday, May 11, 2010

I M IN "CHIP"- MAY MONTH EDITION 2010

1. Don't get me wrong for those of you who read only I M IN "CHIP"...i m not inside the regular chip...but have been able to find space in MAY edition of the Chip - India's Most Trusted Guide To Gadgets And Technology.Scanned copy attached.


2. Thanks CHIP

Monday, May 03, 2010

EAVES DROPPING RISK : EMR

1. Imagine someone sitting in a van outside a person's house can read the EMR that is emanating from the user's laptop computer inside the house and reconstruct the information from the user's monitor on a different device. Different devices have different levels of susceptibility to Tempest radiation. A handheld calculator gives off a signal as much as a few feet away, and a computer's electromagnetic field can give off emissions up to half a mile away. The distance at which emanations can be monitored depends on whether or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that will carry the signals further away from the original source.

2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on the way in which this kind of "eavesdropping" can be prevented is not freely available. Equipment designed to protect military information will probably be three or four times more expensive than the equipment likely to be used for processing of non-military information.Until recently it was considered very difficult to reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping on digital equipment could only be performed by professionals with access to very sophisticated detection and decoding equipment. As a result, digital equipment for processing information requiring medium or low level protection, such as private and business information, is not protected against eavesdropping of this kind.

3. The EMR that is emitted by electric devices contains the information that the device is displaying or storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally began studying this phenomenon in order to prevent breaches in military security. The government was using the technology to their advantage during WWII and realized that they needed to protect themselves against others using the same tactics against them. The name Tempest, or Tempest radiation originated with the U.S. military in the 1960s as the name of the classified study of what was at the time called "compromising emanations."

4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?," in which he demonstrated that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.

5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security government agencies are protecting themselves by constructing safe rooms that through the use of metallic shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot be intercepted. It is possible, though costly, for individual users to shield their home computer systems from EMR leakage.


Powered By Blogger