Wednesday, December 31, 2008

The Securities Division of the Saskatchewan Financial Services Commission issued a Temporary Cease Trade Order today for companies and individuals involved in diamond holdings in the Fort a la Corne area east of Prince Albert. The Order was issued with respect to CMKM Diamonds Inc., its predecessor Casavant Mining Kimberlite International, Urban Armand Joseph Casavant, David DeSormeau and Melvin A. O'Neil. Casavant, DeSormeau and O'Neil are officers, directors and promoters of these companies. The Securities Division is concerned about the trading activities of these companies as well as news releases they have issued about their operations.

CMKM Diamonds Inc. and its predecessor Casavant Mining Kimberlite International are Nevada-based companies with operations primarily in Saskatchewan. Their shares trade on over-the-counter market pink sheets. Vic Pankratz, Deputy Director of Enforcement for the Saskatchewan Financial Services Commission, advises that people who are interested in investing in this type of activity should first seek advice from a stock broker, lawyer, accountant, bank or Credit Union Manager, financial advisor or the Securities Division of the Saskatchewan Financial Services Commission.

Tuesday, December 23, 2008

Chronic Pain

At any given time around one third of Australians are in pain.The way we experience pain is very complex and there may be suffering beyond the hurt:
- many are unable to work
- there can be mental and physical deterioration
- relationships can be weakened
- families may experience disruption and financial difficulties; and
- persistent pain can lead to feelings of hopelessness and dispair

Today much can be done to relieve pain, provide greater comfort, and help many pain sufferers to regain a normal lifestyle. The first step is to seek medical attention for on-going pain. Often it is possible to resolve the problem. Sometimes the pain may need specialist medical treatment, perhaps surgery. Even where the pain cannot be resolved and suffering and disability continue, there are techniques and tools which can help people to live and work with their pain.

Thursday, December 18, 2008

Washington- The U.S. Treasury Department today announced the establishment of a temporary guaranty program for the U.S. money market mutual fund industry. For the next year, the U.S. Treasury will insure the holdings of any publicly offered eligible money market mutual fund – both retail and institutional – that pays a fee to participate in the program.

President George W. Bush approved the use of existing authorities by Secretary Henry M. Paulson, Jr. to make available as necessary the assets of the Exchange Stabilization Fund for up to $50 billion to guarantee the payment in the circumstances described below.

Money market funds play an important role as a savings and investment vehicle for many Americans; they are also a fundamental source of financing for our capital markets and financial institutions. Maintaining confidence in the money market fund industry is critical to protecting the integrity and stability of the global financial system.Concerns about the net asset value of money market funds falling below $1 have exacerbated global financial market turmoil and caused severe liquidity strains in world markets. In turn, these pressures have caused a spike in some short term interest and funding rates, and significantly heightened volatility in exchange markets. Absent the provision of such financing, there is a substantial risk of further heightened global instability.

Maintenance of the standard $1 net asset value for money market mutual funds is important to investors. If the net asset value for a fund falls below $1, this undermines investor confidence. The program provides support to investors in funds that participate in the program and those funds will not "break the buck".This action should enhance market confidence and alleviate investors' concerns about the ability for money market mutual funds to absorb a loss. Investors in money market mutual funds with a net asset value that falls below $1 would be notified that their fund triggered the insurance program.

The Exchange Stabilization Fund was established by the Gold Reserve Act of 1934. This Act authorizes the Secretary of the Treasury, with the approval of the President, "to deal in gold, foreign exchange, and other instruments of credit and securities" consistent with the obligations of the U.S. government in the International Monetary Fund to promote international financial stability.

Tuesday, December 09, 2008

National foreign direct investment policies, industrial development strategies in developing countries and regional policies of developed economies share a common focus. They all arelargely based on the concept of attracting new business to the target territory. The vision of an incoming industrial champion, who may create sustainable employment and who may be the front runner for related businesses to follow, eventually resulting in additional secondary employment effects, has been paramount among policymakers at all layers of government. This subsidies and related government supports are a widely used and important tool for investment and development policies.

Friday, December 05, 2008

European Fan Worm

The European fan worm (Sabella spallanzanii) has been found in South Australia, Victoria, New South Wales and Western Australia. It was first found in South Australia in 1985 at Outer Harbour.
Description
Flexible semi-transparent tube up to 50 cm long and 1 cm wide. Feather-like projections (radioles) extend from the tube, up to 20 cm long. Forms large meadows obscuring the seafloor. Crown of the radioles varies in colour from orange to white to red-brown. Tube outer layer often covered in greyish silt, mud and other small marine organisms. Crown with two different size lobes of radioles - one lobe has more radioles that the and forms a spiral with one of five whorls,the other lobe forms a semicircle

Tuesday, November 25, 2008

To shore up the tottering US economy, President-elect Barack Obama and the Democrats are planning a new massive fiscal stimulus package that could run into as much as USD 700 billion over the next two years, rivalling the bailout sum Congress committed last month.Hints of a hefty new spending programme began emerging last week.

New Jersey Governor Jon Corzine, an Obama advisor and Harvard economist Lawrence H Summers, whom the President-elect has chosen to lead his White House economic team, raised the possibility of USD 700 billion in new spending.Obama advisor and former Clinton administration Labour Secretary Robert Reich and Democrat Senator Charles E Schumer also favoured spending in the range of USD 500 billion to USD 700 billion, the 'Washington Post' reported on Monday.

The amount, if approved, will be one of the biggest public spending programmes aimed at boosting the economy since former President Franklin D Roosevelt's 'New Deal', it said.Transition officials did not confirm to the paper that they are considering spending of that magnitude, but they made clear that economic conditions are dire and suggested that Obama might be forced to delay his pledge to repeal President George W Bush's tax cuts for the wealthy.

While Obama has set a goal of creating or preserving 2.5 million jobs by 2011, his economic team have yet to decide how that would be accomplished or how much it would cost.Austan Goolsbee, a spokesman for Obama on economic issues who is in line to serve on the White House Council of Economic Advisers, on Sunday acknowledged that Obama's jobs plan will cost substantially more than the USD 175 billion stimulus programme he proposed during the campaign.

Monday, November 24, 2008

Mingo Falls

Mingo Falls is on the Cherokee Indian Reservation (Qualla Boundary), just outside Great Smoky Mountains National Park. No special permits are required for access to the reservation. At 120 feet tall, the waterfall is one of the tallest and most spectacular in the southern Appalachians. The hike to the waterfall is only 0.4 miles in length, but is considered moderate in difficulty.

Access Trail: Pigeon Creek Trail
Trailhead: From Oconaluftee Visitor Center, drive south (toward Cherokee) on US-441 and take the second left onto Big Cove Road. At the first stop sign turn left and drive 4.5 miles to Mingo Falls Campground, where the trail begins.

Tuesday, November 18, 2008

GERD

Also called: Gastroesophageal reflux disease
Your esophagus is the tube that carries food from your mouth to your stomach.Gastroesophageal reflux disease (GERD) happens when a muscle at the end of your esophagus does not close properly. This allows stomach contents to leak back, or reflux, into the esophagus and irritate it.

You may feel a burning in the chest or throat called heartburn. Sometimes, you can taste stomach fluid in the back of the mouth. This is acid indigestion. If you have these symptoms more than twice a week, you may have GERD.

Anyone, including infants and children, can have GERD. If not treated, it can lead to more serious health problems. In some cases, you might need medicines or surgery. However, many people can improve their symptoms by
* Avoiding alcohol and spicy, fatty or acidic foods that trigger heartburn
* Eating smaller meals
* Not eating close to bedtime
* Losing weight if needed
* Wearing loose-fitting clothes

Tuesday, November 11, 2008

Gourd

A gourd is a plant of the family Cucurbitaceae, or a name given to the hollow, dried shell of a fruit in the Cucurbitaceae family of plants of the genus Lagenaria.It is in the same family as the pumpkin.

Most commonly, gourds are the product of the species Lagenaria siceraria (the calabash or African bottle gourd), native to Africa, and at a very early date spread throughout the world by human migrations. This species may be the oldest plant domesticated by humans.[citation needed]

Gourds can be used as a number of things, including bowls or bottles. Gourds are also used as resonating chambers on certain musical instruments including the berimbau and many other stringed instruments and drums. Instruments of this type are fairly common to the Caribbean. Gourds are also used as a tool for sipping yerba mate by means of a bombilla, in Chile, Uruguay, Argentina, Paraguay and Brazil, where it is called "cuia" (kOOya). Birdhouse gourds are commonly used in southern USA for group housing for purple martins, which reputedly help control mosquitoes. "Gourd" can also refer to the live fruit before it is dried, or to the entire
plant that produces that fruit.

Wednesday, November 05, 2008

Brazilian Grand Prix

Lewis Hamilton was overwhelmed by emotion after capturing the 2008 world championship by a single point at a thrilling season finale in Brazil.

"It's pretty impossible to put into words," said the 23-year-old, who is now the youngest ever F1 champion.

"It's been such a long journey and I'm so speechless. After all the sacrifices we've made I am so thrilled to be able to do this for everyone.

"It was one of the toughest races of my life - if not the toughest."

Hamilton clinched the title when he passed Timo Glock accelerating out of the final corner of the race to snatch the drivers' crown from Felipe Massa, who took the chequered flag ahead of him.With Massa winning at Interlagos, the Englishman knew he had to finish fifth to claim the title but he had slipped to sixth with one lap to go.In one final twist, however, Hamilton overtook Glock's slowing Toyota to clinch the fifth place he needed - and with it the title.

"The team didn't say anything so I thought I was shot," said Hamilton, who became Britain's ninth world champion and the first since Damon Hill in 1996."I didn't know where Glock was and Vettel was the guy to beat and I couldn't catch him, so at that point I was going to finish sixth. My heart was in my mouth," said Hamilton.


Tuesday, November 04, 2008

Science journalism

Science journalism is a relatively new branch of journalism, in which journalists' reporting conveys information on science topics to the public. Science journalists must understand and interpret very detailed, technical and sometimes jargon-laden information and render it into interesting reports that are comprehensible to consumers of news media.

Scientific journalists also must choose which developments in science merit news coverage, as well as cover disputes within the scientific community with a balance of fairness to both sides but also with a devotion to the facts.

Many, but not all, journalists covering science have training in the sciences they cover, including several medical journalists who cover medicine.

Friday, October 31, 2008

Indian National Calendar

The national calendar based on the Saka Era, with Chaitra as its first month and a normal year of 365 days was adopted from 22 March 1957 along with the Gregorian calendar for the following official purposes:

(i) Gazette of India,
(ii) news broadcast by All India Radio,
(iii) calendars issued by the Government of India and
(iv) Government communications addressed to the members of the public.

Dates of the national calendar have a permanent correspondence with dates of the Gregorian calendar, 1 Chaitra falling on 22 March normally and on 21 March in leap year.

Wednesday, October 22, 2008

DNA in the bones of Adelie penguins that survived the last ice age are helping to shed light on how other animals will cope with climate change, say researchers.Evolutionary biologist Professor David Lambert of Griffith University in Brisbane and colleagues report their analysis of Adelie penguin DNA dating back to 37,000 years in the journal PLoS Genetics.

"Adelie penguins are a wonderful model to study the problem of climate change," said Lambert. "They have lived through temperature fluctuations much higher than those in equatorial regions."Lambert said Adelie penguins have survived several degrees of warming since the last glacial maximum 18,000 years ago.

Wednesday, October 15, 2008

The last remaining survivor of the Titanic plans to sell mementoes from the ship to pay her nursing home fees.

Now 96, Millvina Dean was nine weeks old when the liner sank in the North Atlantic in 1912.She hopes to raise £3,000 by selling items including a suitcase full of clothes given to her by the people of New York after her rescue.The auction in Wiltshire will also feature compensation letters sent to her mother by the Titanic Relief Fund. They explained that she would be awarded one pound, seven shillings and six pence per week.

Several rare prints of the Titanic - including one of it leaving the White Star dock in Southampton - will also go under the hammer.Miss Dean moved into a private nursing home in Ashurst, Hants, two years ago.She told the Southern Daily Echo: "I was hoping to be here for two weeks after breaking my hip, but I developed an infection and have been here for two years. I am not able to live in my home any more.

"I am selling it all now because I have to pay these nursing home fees and am selling anything that I think might fetch some money."The Dean family were emigrating to Kansas when the Titanic went down.Miss Dean was placed in a sack and carried to safety along with her mother and brother.But her father Bertram was one of more than 1,500 people who died.The auction will take place at Henry Aldridge and Son auctioneers in Devizes, Wilts, on Saturday.Andrew Aldridge said: "The suitcase is a very emotive and unusual item and epitomises what the people of New York did for the Titanic survivors.

"It also highlights what state the survivors were in when they got to New York. Many people lost everything down to the clothes they were standing in."Miss Dean is the last survivor of the Titanic after Barbara Dainton, from Cornwall, died last year aged 96.

Friday, October 03, 2008

Today’s quality managers face a myriad of challenges, from monitoring quality of goods to organizing documentation to managing compliance with multiple regulations. Many quality departments address each of their functions with a separate set of practices, leading to duplicated efforts and disorganized documentation. This is compounded by a limited, fragmented use of technology to automate processes.

IBS Quality Management Software is an easy-to-use platform for all your quality needs. The software helps users automate and integrate all their quality management activities, driving accuracy and efficiency across the enterprise. Plus, the software is easy to deploy, learn, and use.

With IBS Quality Management Software, you can:

  • Maintain and distribute all your documentation
  • Execute corrective and preventative actions
  • Improve customer management and supplier quality
  • Perform internal and supplier assessments
  • Assess, prioritize and mitigate risks
  • Improve employee training and qualification
  • Achieve compliance with ISO and FDA regulations

Wednesday, September 24, 2008

Ricky Ponting's Australia arrived in India on Monday for a four-Test tour, setting aside security worries following deadly bomb blasts in the country and in neighbouring Pakistan.

The 15-man squad will spend the next week training in Jaipur before flying to Hyderabad for a four-day match against the Indian board president's XI from October 2.

That will be Australia's only warm-up before the first Test starts in Bangalore on October 9. The remaining Tests will be played in Mohali, New Delhi and Nagpur.

The highly-anticipated tour had been placed in doubt after five co-ordinated bomb blasts ripped through crowded markets in New Delhi on September 13, killing more than 20 people.

A suicide attack on the Marriott Hotel in the Pakistani capital of Islamabad on Saturday that killed 53 people and wounded 266 forced Ponting to admit security concerns were on his mind before the team left Australia.

"I've done it all day today, I've had a lot of discussions with my wife about those exact issues," Ponting said in Sydney on Sunday.

"Our advice was not to go to Pakistan and the advice that we received the last few weeks to tour India has been positive."

Australia cancelled a Test tour of Pakistan in March and also raised security concerns about this month's Champions Trophy there, forcing the tournament to be put off by a year.

Wednesday, September 17, 2008

Nootropic

Nootropics, popularly referred to as "smart drugs", "smart nutrients", "cognitive enhancers" and "brain enhancers", are a class of drugs that improve impaired human cognitive abilities (the functions and capacities of the brain). The term covers a broad range of substances including drugs, nutrients and herbs that have purported cognitive enhancing effects.

The word nootropic was coined in 1964 by the Romanian Dr. Corneliu E. Giurgea, derived from the Greek words noos, or "mind," and tropein meaning "to bend/turn". Typically, nootropics are alleged to work by altering the availability of the brain's supply of neurochemicals (neurotransmitters, enzymes, and hormones), by improving the brain's oxygen supply, or by stimulating nerve growth. However the efficacy of alleged nootropic substances in most cases has not been conclusively determined. This is complicated by the difficulty of defining and quantifying cognition and intelligence.

Wednesday, September 10, 2008

Pharmacogenomics

Pharmacogenomics is the branch of pharmacology which deals with the influence of genetic variation on drug response in patients by correlating gene expression or single-nucleotide polymorphisms with a drug's efficacy or toxicity. By doing so, pharmacogenomics aims to develop rational means to optimise drug therapy, with respect to the patients' genotype, to ensure maximum efficacy with minimal adverse effects. Such approaches promise the advent of "personalized medicine", in which drugs and drug combinations are optimised for each individual's unique genetic makeup.

Pharmacogenomics is the whole genome application of pharmacogenetics, which examines the single gene interactions with drugs.

Tuesday, August 26, 2008

Adenoviruses

Adenoviruses are viruses that carry their genetic material in the form of double-stranded DNA. They cause respiratory (especially the common cold), intestinal, and eye infections in humans. When these viruses infect a host cell, they introduce their DNA molecule into the host. The genetic material of the adenoviruses is not incorporated (transient) into the host cell's genetic material. The DNA molecule is left free in the nucleus of the host cell, and the instructions in this extra DNA molecule are transcribed just like any other gene. The only difference is that these extra genes are not replicated when the cell is about to undergo cell division so the descendants of that cell will not have the extra gene. As a result, treatment with the adenovirus will require readministration in a growing cell population although the absence of integration into the host cell's genome should prevent the type of cancer seen in the SCID trials. This vector system has shown real promise in treating cancer and indeed the first gene therapy product to be licensed to treat cancer is an adenovirus.

Friday, August 22, 2008

Data stream

This article is about the more general meaning of the term "data stream". For the UK-specific DSL technology called "Datastream", also see the IP Stream article.

In telecommunications and computing, a data stream is a sequence of digitally encoded coherent signals (packets of data or datapackets) used to transmit or receive information that is in transmission.

In electronics and computer architecture, a data stream determines for which time which data item is scheduled to enter or leave which port of a systolic array, a Reconfigurable Data Path Array or similar pipe network, or other processing unit or block. Often the data stream is seen as the counterpart of an instruction stream, since the von Neumann machine is instruction-stream-driven, whereas its counterpart, the Anti machine is data-stream-driven.

Tuesday, August 12, 2008

Assisted GPS

Conventional GPS has difficulty providing reliable positions in poor signal conditions. For example when surrounded by tall buildings (as a result of multipath), or when the satellite signals are weakened by being indoors or under trees. Some newer receivers are better at handling these situations.

In addition, when first turned on in these conditions, some non-assisted GPS units may not be able to download the almanac and ephemeris information from the GPS satellites, rendering them unable to function until a clear signal can be received continuously for up to one minute.

An A-GPS receiver can address these problems in several ways, using an Assistance Server:

* The Assistance Server can locate the phone roughly by what cell site it is connected to on the cellular network.
* The Assistance Server has a good satellite signal, and lots of computation power, so it can compare fragmentary signals relayed to it by cell phones, with the satellite signal it receives directly, and then inform the cell phone or emergency services of the cell phone's position.
* It can supply orbital data for the GPS satellites to the cell phone, enabling the cell phone to lock to the satellites when it otherwise could not, and autonomously calculate its position.
* By having accurate, surveyed coordinates for the cell site towers, it can have better knowledge of ionospheric conditions and other errors affecting the GPS signal than the cell phone alone, enabling more precise calculation of position. (See also Wide Area Augmentation System)

Some A-GPS solutions require an active connection to a cell phone (or other data) network to function, in others it simply makes positioning faster and more accurate, but is not required.

As an additional benefit, it can reduce both the amount of CPU and programming required for a GPS Phone by offloading most of the work onto the assistance server. (This is not a large amount for a basic GPS – many early GPSs utilized Intel 80386-class 16MHz CPUs or similar hardware.)

High Sensitivity GPS is an allied technology that addresses some of the same issues in a way that does not require additional infrastructure. However, unlike some forms of A-GPS, high sensitivity GPS cannot provide instant fixes when the phone has been off for some time.

Wednesday, August 06, 2008

Video blogging

Video blogging, sometimes shortened to vlogging is a form of blogging for which the medium is video. Entries are made regularly and often combine embedded video or a video link with supporting text, images, and other metadata.

Video logs (vlogs) also often take advantage of web syndication to allow for the distribution of video over the Internet using either the RSS or Atom syndication formats, for automatic aggregation and playback on mobile devices and personal computers

Vlogging saw a strong increase in popularity beginning in 2005. The Yahoo! Videoblogging Group saw its membership increase dramatically in 2005 . The most popular video sharing site to date, YouTube, founded in February 2005, was publicly launched between August and November 2005. The BBC launched their first official video blog in October 2006, with a feature allowing children to name a new Blue Peter puppy. Many open source content management systems, like WordPress or Drupal, enable posting of video content allowing bloggers to host and administer their own video blogging sites. Moreover, convergence of mobile phones with digital cameras allow publishing of video content to the Web almost as it is recorded.

Wednesday, July 30, 2008

Strapdown systems

Lightweight digital computers permit the system to eliminate the gimbals, creating "strapdown" systems, so called because their sensors are simply strapped to the vehicle. This reduces the cost, eliminates gimbal lock, removes the need for some calibrations, and increases the reliability by eliminating some of the moving parts. Angular rate sensors called "rate gyros" measure how the angular velocity of the vehicle changes.

A strapdown system has a dynamic measurement range several hundred times that required by a gimbaled system. That is, it must integrate the vehicle's attitude changes in pitch, roll and yaw, as well as gross movements. Gimballed systems could usually do well with update rates of 50 to 60 updates per second. However, strapdown systems normally update about 2000 times per second. The higher rate is needed to keep the maximum angular measurement within a practical range for real rate gyros: about 4 milliradians. Most rate gyros are now laser interferometers.

The data updating algorithms ("direction cosines" or "quaternions") involved are too complex to be accurately performed except by digital electronics. However, digital computers are now so inexpensive and fast that rate gyro systems can now be practically used and mass-produced. The Apollo lunar module used a strapdown system in its backup Abort Guidance System (AGS).

Strapdown systems are nowadays commonly used in commercial and tactical applications (arcraft, missiles, etc). However they are still not widespread in applications where superb accuracy is required (like submarine navigation or strategic ICBM guidance).

Wednesday, July 23, 2008

A 'Transaction Processing SystemTo be considered a transaction processing system the computer must pass the ACID test.

From a technical perspective, a Transaction Processing System (or Transaction Processing Monitor) monitors transaction programs, a special kind of programs. The essence of a transaction program is that it manages data that must be left in a consistent state. E.g. if an electronic payment is made, the amount must be either both withdrawn from one account and added to the other, or none at all. In case of a failure preventing transaction completion, the partially executed transaction must be 'rolled back' by the TPS. While this type of integrity must be provided also for batch transaction processing, it is particularly important for online processing: if e.g. an airline seat reservation system is accessed by multiple operators, after an empty seat inquiry, the seat reservation data must be locked until the reservation is made, otherwise another user may get the impression a seat is still free while it is actually being booked at the time. Without proper transaction monitoring, double bookings may occur. Other transaction monitor functions include deadlock detection and resolution (deadlocks may be inevitable in certain cases of cross-dependence on data), and transaction logging (in 'journals') for 'forward recovery' in case of massive failures.

Transaction Processing is not limited to application programs. The 'journaled file system' provided with IBMs AIX Unix operating system employs similar techniques to maintain file system integrity, including a journal.

Wednesday, July 16, 2008

Media ecology

In 1977, Marshall McLuhan said that media ecology "means arranging various media to help each other so they won't cancel each other out, to buttress one medium with another. You might say, for example, that radio is a bigger help to literacy than television, but television might be a very wonderful aid to teaching languages. And so you can do some things on some media that you cannot do on others. And, therefore, if you watch the whole field, you can prevent this waste that comes by one canceling the other out."

Inspired by McLuhan, Neil Postman founded the Program in Media Ecology at New York University in 1971. He described it as

Media ecology looks into the matter of how media of communication affect human perception, understanding, feeling, and value; and how our interaction with media facilitates or impedes our chances of survival. The word ecology implies the study of environments: their structure, content, and impact on people.

Thursday, July 10, 2008

Object database

In an object database (also object oriented database), information is represented in the form of objects as used in object-oriented programming. When database capabilities are combined with object programming language capabilities, the result is an object database management system (ODBMS). An ODBMS makes database objects appear as programming language objects in one or more object programming languages. An ODBMS extends the programming language with transparently persistent data, concurrency control, data recovery, associative queries, and other capabilities.

Some object-oriented databases are designed to work well with object-oriented programming languages such as Python, Java, C#, Visual Basic .NET, C++ and Smalltalk. Others have their own programming languages. ODBMSs use exactly the same model as object-oriented programming languages.

Wednesday, July 02, 2008

E-mail spam

E-mail spam, also known as "bulk e-mail" or "junk e-mail," is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. A common synonym for spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. "UCE" refers specifically to "unsolicited commercial e-mail."

E-mail spam slowly but exponentially grew for several decades to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users. Laws against spam have been sporadically implemented, with some being opt-out and others requiring opt in e-mail. The total volume of spam (over 100 billion emails per day as of April 2008) has leveled off slightly in recent years, and is no longer growing exponentially. The amount received by most e-mail users has decreased, mostly because of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets, networks of virus-infected computers, are used to send about 80% of spam. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising.

Tuesday, June 24, 2008

Malware

Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. The term is a portmanteau of the words malicious and software. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

Many normal computer users are however still unfamiliar with the term, and most never use it. Instead, "computer virus" is incorrectly used in common parlance and even in the media to describe all kinds of malware, though not all malware are viruses.

Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of California, West Virginia, and several other American states.

Wednesday, June 18, 2008

Computer worm

computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Wednesday, June 11, 2008

Human ecosystem

Human ecosystems are complex cybernetic systems that are increasingly being used by ecological anthropologists and other scholars to examine the ecological aspects of human communities in a way that integrates multiple factors as economics, socio-political organization, psychological factors, and physical factors related to the environment.

Tuesday, June 03, 2008

Ergonomics

Ergonomics, also called "Engineering psychology" or "human factors", is the application of scientific information concerning objects, systems and environment for human use (definition adopted by the International Ergonomics Association in 2007). Ergonomics is commonly thought of as how companies design tasks and work areas to maximize the efficiency and quality of their employees’ work. However, ergonomics comes into everything which involves people. Work systems, sports and leisure, health and safety should all embody ergonomics principles if well designed.

It is the applied science of equipment design intended to maximize productivity by reducing operator fatigue and discomfort. The field is also called biotechnology, human engineering, and human factors engineering. Ergonomic research is primarily performed by ergonomists who study human capabilities in relationship to their work demands. Information derived from ergonomists contributes to the design and evaluation of tasks, jobs, products, environments and systems in order to make them compatible with the needs, abilities and limitations of people.

Wednesday, May 28, 2008

Alternative terms for free software have been a controversial issue among free software users from the late 1990s onwards. Coined in 1983 by Richard Stallman, "free software" is used to describe software which can be used, modified, and redistributed with little or no restriction. These freedoms are formally described in The Free Software Definition, first published in February 1986.

Alternatives for "free software" were sought because some businesses were uncomfortable with the word "free"s association with the ideas of freedom/liberty. A second problem was that the "available at no cost" ambiguity of the word "free" was seen as discouraging business adoption. In a 1998 strategy session in California, "open-source software" was selected by Todd Anderson, Larry Augustin, Jon Hall, Sam Ockman, Christine Peterson, and Eric S. Raymond. Richard Stallman had not been invited. The session was arranged in reaction to Netscape's January 1998 announcement of a source code release for Navigator (as Mozilla). Those at the meeting described "open source" as a "replacement label" for free software and founded the Open Source Initiative to promote the term as part of "a marketing program for free software" . Stallman and others object to the term "open-source software" because it does not describe all of the freedoms associated with the free software definition.

Tuesday, May 20, 2008

Psychosynthesis

Psychosynthesis is an original approach to psychology that was developed by Roberto Assagioli. He considered it an Existential psychology which includes spiritual goals and concepts. Psychosynthesis was not intended to be a school of thought or an exclusive method but many conferences and publications had it as central theme and centers were formed in Italy and the USA in the 1960s.

Psychosynthesis departed from the empirical foundations of psychology in that it studied a person as a personality and a soul but Assagioli continued to insist that it was scientific. Assagioli developed therapeutic methods other than what was found in psychoanalysis. Although the unconscious is an important part of the theory, Assagioli was careful to maintain a balance with rational, conscious therapeutical work.

Tuesday, May 13, 2008

Cellular automaton

A cellular automaton (plural: cellular automata) is a discrete model studied in computability theory, mathematics, theoretical biology and microstructure modeling. It consists of a regular grid of cells, each in one of a finite number of states. The grid can be in any finite number of dimensions. Time is also discrete, and the state of a cell at time t is a function of the states of a finite number of cells (called its neighborhood) at time t − 1. These neighbors are a selection of cells relative to the specified cell, and do not change (though the cell itself may be in its neighborhood, it is not usually considered a neighbor). Every cell has the same rule for updating, based on the values in this neighbourhood. Each time the rules are applied to the whole grid a new generation is created.

Wednesday, May 07, 2008

New Mobility Agenda

The New Mobility Agenda is an international institution which while virtual and an open collaborative was originally set up by an international working group meeting at the Abbey de Royaumont near Paris with the support of the OECD in Paris in 1974 to challenge old ideas and practices in the field of urban transport through a long term collaborative program of information exchange, education and peer support. The Agenda today draws together the experience, expertise and support of more than four thousand individuals and groups world wide in an open collaborative peer network. One of the original proponents of this approach, Professor Mikoto Usui then director of the OECD Development Centre, referred to it in the founding meeting at the “Abbé de Royaumont as an “invisible college”. Drawing together the experience and expertise of more than four thousand individuals and groups world wide, who are networked via a combination of websites, discussion groups and fora, and collaborative projects, the Agenda takes an approach to transportation planning, policy and practice that has gained considerable force over the last two decades -- provides a leading-edge alternative to earlier (20th century) methods of looking at and providing mobility for people and goods in cities. The Agenda has received prestigious awards for its contributions, including the Stockholm Environment Challenge Prize (2000) and the World Technology Environment Award (2002).

Tuesday, April 29, 2008

Cost overrun

Cost overrun is defined as excess of actual cost over budget. Cost overrun is also sometimes called "cost escalation," "cost increase," or "budget overrun." However, cost escalation and increases do not necessarily result in cost overruns if cost escalation is included in the budget.

Cost overrun is common in infrastructure, building, and technology projects. One of the most comprehensive studies of cost overrun that exists found that 9 out of 10 projects had overrun, overruns of 50 to 100 percent were common, overrun was found in each of 20 nations and five continents covered by the study, and overrun had been constant for the 70 years for which data were available. For IT projects, an industry study by the Standish Group (2004) found that average cost overrun was 43 percent, 71 percent of projects were over budget, over time, and under scope, and total waste was estimated at US$55 billion per year in the US alone.

Tuesday, April 22, 2008

Containerization

Although having its origins in the late 1780s or earlier, the global standardisation of containers and container handling equipment was one of the important innovations in 20th century logistics.

By the 1830s, railroads on several continents were carrying containers that could be transferred to trucks or ships, but these containers were invariably small by today's standards. Originally used for shipping coal on and off barges, 'loose boxes' were used to containerize coal from the late 1780s, on places like the Bridgewater Canal. By the 1840's, iron boxes were in use as well as wooden ones. The early 1900s saw the adoption of closed container boxes designed for movement between road and rail.

Tuesday, April 15, 2008

Snapshot isolation

In databases, snapshot isolation is a guarantee that all reads made in a transaction will see a consistent snapshot of the database, and the transaction itself will successfully commit only if no updates it has made conflict with any concurrent updates made since that snapshot.

Snapshot isolation (SI) has been adopted by several major database management systems, such as SQL Anywhere, InterBase, Firebird, Oracle, PostgreSQL and Microsoft SQL Server. The main reason for its adoption is that it allows better performance than serializability, yet still avoids the kind of concurrency anomalies that cannot easily be worked around. SI has also been to critique the ANSI SQL-92 standard's definition of isolation levels, as it exhibits none of the "anomalies" that the SQL standard prohibited, yet is not serializable (the anomaly-free isolation level defined by ANSI).

Tuesday, April 08, 2008

In computing, an integrated development environment (IDE) is a software application that provides comprehensive facilities to computer programmers for software development. An IDE normally consists of a source code editor, a compiler and/or interpreter, build automation tools, and (usually) a debugger. Sometimes a version control system and various tools are integrated to simplify the construction of a GUI. Many modern IDEs also have a class browser, an object inspector, and a class hierarchy diagram, for use with object oriented software development.

Friday, April 04, 2008

Database security

Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Database security is also a specialty within the broader discipline of computer security.

Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network opposed to being located within a demilitarized zone. Additional network security devices that detect and alert on malicious database protocol traffic include network intrusion detection systems along with host-based intrusion detection systems.

Tuesday, March 25, 2008

Reverse proxy

A reverse proxy or surrogate is a proxy server that is installed within the neighborhood of one or more servers. Typically, reverse proxies are used in front of Web servers. All connections coming from the Internet addressed to one of the Web servers are routed through the proxy server, which may either deal with the request itself or pass the request wholly or partially to the main web servers.

A reverse proxy dispatches in-bound network traffic to a set of servers, presenting a single interface to the caller. For example, a reverse proxy could be used for load balancing a cluster of web servers. In contrast, a forward proxy acts as a proxy for out-bound traffic. For example, an ISP may use a proxy to forward HTTP traffic from its clients to external web servers on the internet; it may also cache the results to improve performance.

Tuesday, March 18, 2008

MySQL

MySQL (pronounced /maɪˌɛskjuːˈɛl/ "my S-Q-L") is a multithreaded, multi-user SQL database management system (DBMS) which has more than 11 million installations. The basic program runs as a server providing multi-user access to a number of databases.

Originally financed in a similar fashion to the JBoss model, MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now a subsidiary of Sun Microsystems, which holds the copyright to most of the codebase. The project's source code is available under terms of the GNU General Public License, as well as under a variety of proprietary agreements.

Monday, March 10, 2008

Computational chemistry

Computational chemistry is a branch of chemistry that uses computers to assist in solving chemical problems. It uses the results of theoretical chemistry, incorporated into efficient computer programs, to calculate the structures and properties of molecules and solids. While its results normally complement the information obtained by chemical experiments, it can in some cases predict hitherto unobserved chemical phenomena. It is widely used in the design of new drugs and materials.

Examples of such properties are structure (i.e. the expected positions of the constituent atoms), absolute and relative (interaction) energies, electronic charge distributions, dipoles and higher multipole moments, vibrational frequencies, reactivity or other spectroscopic quantities, and cross sections for collision with other particles.

Wednesday, March 05, 2008

Aviation

Aviation encompasses all the activities relating to airborne devices created by human ingenuity, generally known as aircraft. These activities include the organizations and regulatory bodies as well as the personnel related with the operation of aircraft and the industries involved in airplane manufacture, development, and design.

Tuesday, February 19, 2008

Liquid Inkjet Printers

Liquid inkjet printers very small, exact amounts (generally a few picolitres) of ink onto the media. These droplet of ink will carry a small electrical charge. The situation of the ink on the page is then determined by the accuse of a cathode and electrode between which the ink moves towards the paper. Inkjet printing (and the related bubble-jet technology) are the most general -quality inkjet printers are inexpensive to produce.

Almost all recent inkjet printers are color devices; some, known as photo printers, include extra pigments to better reproduce the color range needed for high-quality photographic prints (and are additionally capable of printing on photographic card stock, as opposed to plain office paper).

Inkjet printers consist of nozzles that create very small ink bubbles that turn into tiny droplets of ink. The dots shaped are the size of tiny pixels. Ink-jet printers can be able to print high fineness text and graphics. They are also more or less silent in operation. Inkjet printers have a much lesser initial cost than do laser printers, but have a much higher cost-per-copy, as the ink needs to be regularly replaced.

Wednesday, January 23, 2008

United Kingdom

Until decimalization in the United Kingdom in 1971, the abbreviation., from solidus, was used to represent a shilling, worth one-twentieth of a Pound genuine, just as d. stood for denarii (pennies) and £ stood and still stands for Libra (pound). Though the shilling and its short form are no longer used, a slang word for shilling, "bob", is still occasionally used in expressions like "a few bobble", i.e. a bit of money.

Monday, January 07, 2008

Sustainable transportation concerns systems, policies, and technologies. It aims for the efficient transit of goods and serivces, and sustainable freight and delivery systems. The design of vehicle-free city planning, along with pedestrian and bicycle frendly design of neighbourhoods is a critical aspect for grassroots activities, as are telework and teleconferencing.