Friday, July 21, 2017

Technology on the go / How Do They Do That


Ever wonder how that GPS System you got from your wife this holiday season actually works? Or, how engineers fit all that horse power in the Ferrari you wish you had gotten with the GPS? Science Channel's popular series HOW DO THEY DO IT? is providing answers to these questions and more about Ferraris, GPS systems, mega freeways, champagne, jumbo jets, gravity suits, LED televisions, electricity and other popular everyday or exotic items.

Traveling and don't feel like reading? View very easy tech steps through amazing short videos



New Zealand launches into space race with 3D-printed rocket

 Interactive > http://tinyurl.com/kcnj5a6


“Our focus with the Electron has been to develop a reliable launch vehicle that can be manufactured in high volumes. Our ultimate goal is to make space accessible by providing an unprecedented frequency of launch opportunities,” said Peter Beck, Rocket Lab founder and chief executive in a statement.
The firm had spent the past four years preparing for the test launch and last week received the go-ahead from the US Federal Aviation Administration, which is monitoring the flight.
Bad weather had delayed the rocket from taking off three times this week.
New Zealand has created new rocket legislation and set up a space agency in anticipation of becoming a low-cost space hub.
Ships and planes need re-routing every time a rocket is launched, which limits opportunities in crowded US skies, but New Zealand, has only Antarctica to its south. The country is also well-positioned to send satellites bound for a north-to-south orbit around the poles.
But many locals in the predominantly Maori community were not happy with access to public areas blocked.
“People come to Mahia so they can go to the beach and it’s been chopped off now and by the sounds of it one of these rockets are going to be launching one every 30 days so they’ve taken over our lifestyle,” said Mahia farmer Pua Taumata.
But Taumata also said the programme could bring opportunities.
“I’m for technology ... a lot of things could come of it through education. It gives our children something different in their careers. Nobody thought to get into the space industry (before now),” he said.
Rocket Lab is one of about 30 companies and agencies worldwide developing small satellite launchers as an alternative to firms jostling for space on larger launches or paying around $50 million for a dedicated service. The company said in a statement it has now received $148m in funding and is valued in excess of $1bn.
Rocket Lab’s customers include NASA, earth-imaging firm Planet and startups Spire and Moon Express.
The firm will carry out two more tests before it starts commercial operations, slated to begin towards the end of this year.

Since you’re here …

… we have a small favour to ask. More people are reading the Guardian than ever but advertising revenues across the media are falling fast. And unlike many news organisations, we haven’t put up a paywall – we want to keep our journalism as open as we can. So you can see why we need to ask for your help. The Guardian’s independent, investigative journalism takes a lot of time, money and hard work to produce. But we do it because we believe our perspective matters – because it might well be your perspective, too.
High quality journalism is essential intellectual nourishment. The generosity of providing such a service without a paywall deserves recognition and supportGiacomo P, Italy
I’ve been enjoying the Guardian’s top-quality journalism for several years now. Today, when so much seems to be going wrong in the world, the Guardian is working hard to confront and challenge those in power. I want to support thatRobb H, Canada
I appreciate there not being a paywall: it is more democratic for the media to be available for all and not a commodity to be purchased by a few. I’m happy to make a contribution so others with less means still have access to information.Thomasine F-R, Sweden
If everyone who reads our reporting, who likes it, helps to support it, our future would be much more secure.

Navy decreases hardware footprint of mobile command centers


The Navy is accelerating efforts to acquire small, mobile command and control centers around the world as part of a broader effort to consolidate IT networks and streamline operations.
The service is now modernizing its Deployable Joint Command and Control (DJ2C) technology to reduce the hardware footprint and increase software-defined storage.
The project combines traditional computing and storage resources into a single source, according to officials from Nutanix, a Silicon Valley firm contracted by the Navy for the project. Nutanix is a subcontractor to Crown Point Systems on the deal. Thus far, the Navy has acquired more than 30 of the upgraded systems.
“The Nutanix platform integrates server, storage, virtualization and networking into a single appliance, eliminating the requirements for expensive and inefficient three-tiered data center architectures,” said Chris Howard, who is the Vice President of Federal for Nutanix. 
Described by developers as “data centers in a box,” the new DJ2C apparatus is roughly one-fourth the size of the legacy system it is replacing, which creates additional cooling advantages as well, Howard added.
The program is part of a larger Navy effort to consolidate data centers worldwide, reduce the hardware burden and connect U.S. with overseas IT systems.


Current Continental United States, or CONUS, domestic data systems are separated from overseas data systems closer to a shore-based operational environment. The Navy Marine Corps Intranet, or NMCI and the OCONUS Navy Enterprise Network (ONE-NET) will transform from separate environments to a globally integrated network, a Navy statement said. 

The integration of NMCI and ONE-Net will bring standardization of network command-and-control and the way network services are delivered globally to Navy shore locations, service officials explained. 
“We believe we can expand to OCONUS to be able to improve the services and standardize the services. This requires a lot of engagement with OCONUS commanders. We will drive increased speed, capability and security with less cost over time and get more user bandwidth,” Capt. Michael Abreu, program manager for the Naval Enterprise Networks program office, told reporters. 
The DJ2C modernization effort also enables an enterprise cloud approach designed to bring the benefits of cloud technology without sacrificing the security and control of on-premises infrastructure.
This is entirely consistent with the Navy’s accelerated movement to the cloud as part of a move to decrease the hardware components to data centers, IT networks and global command-and-control systems. The hope, Navy and industry developers explain, is to execute this in a way that increases -- or better facilitates -- cyber security.
“Cyber security offers a whole wealth of other things to look at, intrusion detection systems and intrusion protections rights, so that’s a whole another layer in the software stack from an infrastructure perspective,” Howard said.
The five-year, firm-fixed-price Indefinite Delivery/Indefinite Quantity contract has a total overall maximum value of $28.8 million available to the Crown Point Systems team; this team also includes leading technology integrator World Wide Technology, if all orders are exercised. To date, Nutanix has received orders from Crown Point Systems for approximately $3.5 million as part of the contract.
Kris Osborn

TCP/IP (Transmission Control Protocol/Internet Protocol)

TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.


TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem. 
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).

Learn About Simulation Technologies



The entire driving simulation system (5 screens & complete cab) and instructor operating station runs on One PC. Sim-Tech’s single computer uses an Intel multi-core processor running a Windows 7 platform. The computer is equipped with dual mirrored hard drives for zero down time in the unlikely event of hard drive failure. Providing all graphic channels with a single PC eliminates networking issues and significant down time inherent in all other systems and provides much faster initial system startup and shutdown at the end of the day. It is estimated that a single PC system is between 6 to 12 times as reliable as a system relying on 5 to 9 networked computers. Software upgrades are a snap, taking only a minute or two (depending on internet connection). And the potential cost of future hardware upgrades is greatly diminished in comparison to systems using five or more computers.

Thursday, July 20, 2017

Highly advanced tech

It's time to meet yourself.

Mensa Workout

This quiz is provided for entertainment purposes only; it is not an IQ test. This score will not qualify you for Mensa. The questions on the "Mensa Workout" are biased towards people whose primary language is English. Mensa offers culture-fair testing throughout the world. Many of the questions on the "Mensa Workout" require you to have a graphical browser. The test is still enjoyable for those with text-only browsers, but your overall score may be considerably lower than it might be with a graphical browser.
You have half an hour to answer 30 questions. Answers to the questions and discussion of the answers are provided at the time you submit your answers. While there is a 30-minute time limit to take the test, the amount of time you actually take in no way affects your final score. This is due to the differences in transmission times on the internet, and server loads.
IMPORTANT:  The questions in this quiz were devised by Dr Abbie Salny, and are copyright.  Permission to use any of the questions may be granted for educational or other approved purposes by contacting Mensa International.

Some very simple tech

*People are always coming up with ways to steal from you online. You can left click and view "the source" in an email. (I don't have time to explain) Or you can take 5 seconds and actually view the source.
 Major businesses seldom send out mass emails and make sure your email address or name appears "alone" with the received email.

This? My mom asked me to fix it, it's an Asus so I did.


Disruptive Influences: 20 Tech Companies to Watch

My Health Tech

*When I arrived home from Asia, within one week I had some health conflicts. I wondered what could be the cause?
 I went to my doctor and he wanted to immediately fill me with pills. No doc, not so fast with the pills.
We reached a "simmering" point within the brief conversation.

 I went home and began to analyze this problem. Day 1, 2, 10, 12, using deductive reasoning. I began with coffee, then oils, so on and so forth.
 Once again, I've lived in countries where individuals have never seen a doctor in their entire lives. Families use all natural solutions and I have adopted their way of thinking.

 So after analyzing this, what synthesis evolved? It was salt. I looked back to C. America and Asia and my salt consumption had quadrupled. All natural takes on a whole new meaning "if" you live the simple life among the people and stay away from commercialized products.

 Do yourselves a favor, be self-aware, employ practicality, simply because someone has a white lab coat doesn't mean they know you better than yourself.

 Am I communicating any better, I'm working on it.

This? This is just lunch.

The Ten Most Outrageous Kit Cars You Can Get Right Now





Kit cars often offer great compromise when searching for an authentically historic driving experience, but with the possibility of more power and reliability in a classic, without diminishing resale value. But sometimes, kit manufacturers take it too far.


10.) Bentley Body Kits For Chrysler Sebring/300C





9.) Any Lamborghini Countach Replica


The original Countach was an insane, inimitable, piece of machinery. So of course people couldn’t help themselves from attempting to replicate the beauty. Unfortunately, most failed miserably. And then there’s that guy that spent seventeen years crafting one in his basement.

8.) Factory Five 818S


The Factory Five 818s allows for Subaru owners to make use of parts from their recently wrecked WRX’s and transplant into a tubular framed, composite wrapped, all wheel drive roadster.. The 818 takes the heart from a WRX, as well as several other components, and combines everything to create the open top WRX we never had. And who doesn’t love the brap of Subaru’s boxer four?

7.) Ultima Evolution Coupe


With a top speed of more than 240MPH and a 0-60 time of 2.3 seconds, the Ultima Evolution comes in as one of the most full on, balls out, road cars around the $100,000 mark. 

6.) Exomotive Exocet Miata


What’s better than a stock Miata? A Spec Miata. What’s better than a Spec Miata? An Exocet Miata. Exomotive will take a Miata, strip it, remove the body, cage it, and even drop an LS in it if requested. 

5.) CaterhamSeven


Why fix something that’s not broken? There’s a reason Caterham has not fiddled with the core formula that makes up the Seven, it’s perfect. Whether you have the 79 horsepower, three cylinder under the hood, or the supercharged, 310 horsepower Duratec, the Seven is one of the most capable and exciting cars one can buy. 


Top 5

Cyber criminals still targeting mobile phones as their number 1 target of hacking


Cyber criminals 'could target smart phones in bid to hold users to ransom

SMART phones, watches, televisions, and fitness trackers could be targeted by cyber criminals seeking to hold users to ransom over their personal data, cyber security chiefs have warned.

The rise of internet-connected devices gives attackers more opportunity to deploy their increasingly "aggressive" and "confrontational" tactics, says a joint report from the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA).
It highlights the huge amount of personal information on consumer gadgets which could be exploited by criminals seeking to commit extortion or fraud.
The study forecasts that this year it is likely that "ransomware" will target connected devices containing data such as photos, emails and even fitness progress information.


"This data may not be inherently valuable, and might not be sold on criminal forums but the device and data will be sufficiently valuable to the victim that they will be willing to pay for it," the assessment says.
"Ransomware on connected watches, fitness trackers and TVs will present a challenge to manufacturers, and it is not yet known whether customer support will extend to assisting with unlocking devices and providing advice on whether to pay a ransom."
A surge in the number and variety of internet-ready products has sparked a string of security warnings.
There have even been suggestions that baby monitors and pacemakers could be vulnerable to hacking.
Analysts have forecast that by 2020 there will be as many as 21 billion connected devices used by businesses and consumers around the world.
The NCSC and NCA's 2016/17 report on the cyber threat to UK business says: "The rise of internet connected devices gives attackers more opportunity."
The paper notes that smart devices are still "inherently more difficult" to attack than traditional computers, saying that incidents may initially be limited to users who download apps from third-party app stores.
Ministers launched the NCSC, which is part of GCHQ, amid mounting concern over the potential danger to Britain's industry and infrastructure from online attacks.

The new report says the cyber threat to UK business is "significant and growing".
In three months after the centre was created, there were 188 "high-level" attacks as well as "countless" lower-level incidents.
The danger is "varied and adaptable", ranging from high-volume, opportunistic attacks to "highly sophisticated" and persistent threats.

The last year "has been punctuated by cyber attacks on a scale and boldness not seen before", the report says, pointing to a string of incidents including the targeting of the US Democratic Party and Bangladesh Bank.
Ciaran Martin, chief executive of the NCSC, said: "Cyber attacks will continue to evolve, which is why the public and private sectors must continue to work at pace to deliver real-world outcomes and ground-breaking innovation to reduce the threat to critical services and to deter would-be attackers."
The report will be published on Tuesday as the NCSC hosts a major conference on cyber security in Liverpool.
It also says that there is no clear understanding of the true scale and cost of cyber attacks to the UK as it is under-reported.
Donald Toon, the director for economic and cyber crime at the NCA, said: "Businesses reporting cyber crime is essential if we are to fully understand the threat, and take the most effective action against it."
It comes days after it was revealed that GCHQ has warned political parties of the the threat posed to democracy by Russian hackers.

Curiosity Presents: The Science of Productivity (And How To Improve Yours)


Our 2017 resolution is simple: increase productivity. (Is there anything more satisfying than powering through a to-do list?) There are a ton of theories as to how to do more—and how to do it faster—but not all are backed by science. To get the new year started on the right foot, we're gathering everything we know about productivity in one place. All of these concepts have been researched and proven by studies, or they're popular methods conceived by experts (businessmen! physicists!) that you can try out for yourself.
Check out the topics below to start your month of productivity and learn more about why productivity matters, how you can be more productive, and what you can just forget about (spoiler: stop multitasking).

Improve Your Productivity: Scientifically Proven Approaches

Work For 90 Minutes, Then Take A Break
What's more effective: working nonstop for five hours, or working in three 90-minute intervals interspersed with 20-minute breaks? For many office workers it might seem like the first option is best. Read more >>

Want To Be More Productive At Work? Scroll Through Cute Puppy Photos (Or Any Baby Animal Will Do)
You know that moment when your boss walks over to your computer and instead of having work on your screen, she catches you clicking through a "cute kitty" slideshow? Chalk it up to improving productivity. Read more >>

Improve Your Work Performance By Taking A Nap
It's about 3 pm on a work day, and you're experiencing the dreaded midday slump. Before you gulp another mug of caffeine, consider a different option: napping. You might've dismissed naps as a respite for toddlers or your 80-year-old grandmother, but science has proven that naps can be incredibly beneficial for getting those brain juices flowing and boosting your productivity. Read More >>

Easy Techniques: Proven Methods From Successful People

The Ivy Lee Method Is The 100-Year-Old Productivity Secret
When businessman Ivy Lee gave Charles Schwab his five-step method, he told Schwab to pay him what he thought it was worth after testing it out for three months. Ninety days later, Schwab paid Lee the equivalent of $400,000 in today's dollars. Read more >>
Learn Anything In Four Steps With The Feynman Technique
With the Feynman Technique, you learn by teaching someone else in simple terms so you can quickly pinpoint the holes in your knowledge. After four steps, you'll understand concepts more deeply and better retain the information. Read more >>

Myths: These Practices Are Actually Hurting Your Productivity

Stop Multitasking
According to Dr. Adam Gazzaley, a neuroscientist at the University of California, your brain simply isn't optimized for split attention. Read more >>
Listening To Music At Work Isn't Helping
Listening to background music at work may hurt you more than help you...but it's complicated. Read more >>
Highly interactive and linked back to source.

Featured Posts

Beautiful American Bully Pups for Sale

 

Popular Posts