Wednesday, 10 December 2014

The Effects Of Gravity (I)

Part Of The Solar System

Every time you jump, you experience gravity. It pulls you back down to the ground. Without gravity, you'd float off into the atmosphere -- along with all of the other matter on Earth.
You see gravity at work any time you drop a book, step on a scale or toss a ball up into the air. It's such a constant presence in our lives, we seldom marvel at the mystery of it -- but even with several well-received theories out there attempting to explain why a book falls to the ground (and at the same rate as a pebble or a couch, at that), they're still just theories. The mystery of gravity's pull is pretty much intact.
So what do we know about gravity? We know that it causes any two objects in the universe to be drawn to one another. We know that gravity assisted in forming the universe, that it keeps the moon in orbit around the Earth, and that it can be harnessed for more mundane applications like gravity-powered motors or gravity-powered lamps.
As for the science behind the action, we know that Isaac Newton defined gravity as a force -- one that attracts all objects to all other objects. We know that Albert Einstein said gravity is a result of the curvature of space-time. These two theories are the most common and widely held (if somewhat incomplete) explanations of gravity.
In this article, we'll look at Newton's theory of gravity, Einstein's theory of gravity and we'll touch on a more recent view of the phenomenon as well.
Although many people had already noted that gravity exists, Newton was the first to develop a cohesive explanation for gravity, so we'll start there.

Tuesday, 9 December 2014

Canadian ISIS member calls for attacks against his country

Add caption

John Maguire

ISIS member beheading a young man

An Ottawa native-turned-extremist appeared in a video where he rebukes the Canadian government for participating in the fight against the Islamic State, while calling on Muslims to carry out attacks on Canadian soil.
In the six-minute video, a young man who identifies himself as Abu Anwar al-Canadi is seen standing before the ruins of a building, with a mosque in the background.
He proceeds to tell his fellow Canadians that they have “absolutely no right to live in a state of safety and security” when the Canadian government is presently “carrying out atrocities” against the adherents of the Islamic faith, he said, in comments reprinted by the National Post.
READ MORE: Canada charges 15yo with terrorism offences – for robbery
Attacks on Canadian soil “where it hurts you the most” should not come as a surprise to Canadians, the video states.
The man in the video has been identified as John Maguire, 24, who reportedly converted to Islam before leaving his homeland sometime last year. Maguire, who reportedly left the University of Ottawa before graduation, speaks perfect English in the brief declamation.
The video – like so many others before it - was picked up by the SITE Intelligence Group, a private agency co-founded by Rita Katz that tracks extremist website activity. The piece was reportedly produced by a “propaganda group” connected to Islamic State [IS, formerly ISIS/ISIL], although SITE does not provide the name of the group.
Abu Anwar al-Canadi, one of the dozens of Canadians thought to have joined extremist groups in Iraq and Syria, called on Canadians to “follow the example” of the attackers who struck in Ottawa and Saint-Jean-sur-Richelieu, Quebec, in October.
Source: rt.com

Albert Einstein's Role In World War II

world-war-allied-bombing
 
Albert Einstein

Einstein was an advocate of Pacifism, and so many people will be surprised to read about the role he played in the Second World War (WWII).  Below is a letter Einstein wrote to the then America President Franklin D. Roosevelt about the urgent need to develop the Atomic Bomb before Germany

Einstein's Letter to Franklin D. Roosevelt

  • Albert Einstein
  • Old Grove Rd.
  • Nassau Point
  • Peconic, Long Island

August 2nd, 1939

  • F.D. Roosevelt,
  • President of the United States,
  • White House
  • Washington, D.C.

Sir:

Some recent work by E.Fermi and L. Szilard, which has been communicated to me in manuscript, leads me to expect that the element uranium may be turned into a new and important source of energy in the immediate future. Certain aspects of the situation which has arisen seem to call for watchfulness and, if necessary, quick action on the part of the Administration. I believe therefore that it is my duty to bring to your attention the following facts and recommendations:

In the course of the last four months it has been made probable—through the work of Joliot in France as well as Fermi and Szilard in America—that it may become possible to set up a nuclear chain reaction in a large mass of uranium, by which vast amounts of power and large quantities of new radium-like elements would be generated. Now it appears almost certain that this could be achieved in the immediate future.

This new phenomenon would also lead to the construction of bombs, and it is conceivable—though much less certain—that extremely powerful bombs of a new type may thus be constructed. A single bomb of this type, carried by boat and exploded in a port, might very well destroy the whole port together with some of the surrounding territory. However, such bombs might very well prove to be too heavy for transportation by air.

The United States has only very poor ores of uranium in moderate quantities. There is some good ore in Canada and the former Czechoslovakia, while the most important source of uranium is Belgian Congo.

In view of this situation you may think it desirable to have some permanent contact maintained between the Administration and the group of physicists working on chain reactions in America. One possible way of achieving this might be for you to entrust with this task a person who has your confidence and who could perhaps serve in an inofficial capacity. His task might comprise the following:

a) to approach Government Departments, keep them informed of the further development, and put forward recommendations for Government action, giving particular attention to the problem of securing a supply of uranium ore for the United States;

b) to speed up the experimental work, which is at present being carried on within the limits of the budgets of University laboratories, by providing funds, if such funds be required, through his contacts with private persons who are willing to make contributions for this cause, and perhaps also by obtaining the co-operation of industrial laboratories which have the necessary equipment.

I understand that Germany has actually stopped the sale of uranium from the Czechoslovakian mines which she has taken over. That she should have taken such early action might perhaps be understood on the ground that the son of the German Under-Secretary of State, von Weizsäcker, is attached to the Kaiser-Wilhelm-Institut in Berlin where some of the American work on uranium is now being repeated.

Yours very truly,

Albert Einstein

 
Click the link below for more info on the Second World War

 

Monday, 8 December 2014

Mobile Phones, How Secured Are They?



We live in a world computers and phone are integral part of our everyday living, few us bother to
think about the safety of the devices that contains so much of their privacy, passwords, email addresses, credit cards details etc. This articles discusses how to secure your mobile phone and the information it carries.

Mobile Threat Monday is such a SecurityWatch institution that it's hard to realize it only began last spring. At first we called it "Dangerous Android Apps," and it appeared on Friday, not Monday. We realized, though, that mobile threats aren't limited to Android, so in June we opened it up to all kinds of mobile threats. Altogether we've posted over 30 Mobile Threat Monday columns covering over 60 distinct threats.
Thanks to Our Contributors
This column simply wouldn't exist without the contributions of researchers from around the world. We've posted warnings based on alerts from Symantec, McAfee, Lookout, and Kaspersky, among others. However, three major contributors have powered the vast majority of our posts.
Appthority and Bitdefender are definitely the top two. Between the two of them, they've given us more than half of the threats we've reported. F-Secure is another big contributor. Three quarters of submissions come from these, the top three. Thanks, guys!
Android, Android, Android
We did take "Android" out of the column's title, but Android absolutely dominates the field of mobile malware. BlackBerry showed up precisely once, in a warning about the Tube Map Live app, which fails to secure your personal information. This one affected Android too; no surprise there.
Fake Browser signs users up for premium SMS services. It "looks and feels like a native iOS app," but in truth it's a mobile website. It doesn't really count as an instance of iOS malware. Poor programming in the Mailbox iOS app allowed execution of arbitrary Javascript; the developers fixed that right away. Only a handful of other columns have dealt with anything but Android dangers.


More Than Malware
While we've reported on banking Trojans that steal your money and actual malicious programs that can completely take over your device, the vast majority of threats aren't as actively nasty. Mobile app developers just want to make money, and some have few scruples about just how they do it.
One almost-legitimate way to make money involves advertising. Hook your free app to an advertising network and you can expect a modest income. But some programs go too far, scraping personal information and sharing it with over-aggressive ad networks. Around 20 percent of threat's we've reported involve this sort of abuse.
A more direct way to siphon money out of the victim's pocket involved premium SMS numbers. You've probably seen them connected with charity efforts; text to such-a-number and donate $10 to the relief fund. Premium SMS is pretty well-regulated in the U.S.; not so much in other countries, including Russia and China. Trojanized apps that send premium SMS messages are more prevalent in these countries, and we've reported on quite a few.


Then there are the developers that have no bad intentions, just bad coding skills. Their errors can expose personal data including medical history, passwords, and instant messages. An app that fails to properly secure your personal information can be just as damaging as one that actively steals data.
All Together on the Chorus
So, what should you do to stay safe? You could switch to iOS, but if you're an Android user that's probably not what you want to hear. Trojanized or ill-designed apps do sometimes show up in official Android app stores, but unofficial sources are much more likely to be compromised. Stick to the safe stores, and make sure your device is set to reject installations from other sources.
Pay attention to the permissions requested when you install an app. Does that free flashlight app really need to know your location? Many Android security products will double-check permissions for you and offer advice; Editor's Choice avast! Mobile Security & Antivirus is one such, and it's free.
In the U.S. you're less likely to get hit with premium SMS charges, but keep an eye on your bill regardless; it could happen. And of course, keep reading Mobile Threat Monday and SecurityWatch to stay abreast of the latest developments.
Source:http://securitywatch.pcmag.com/mobile-security/319106-mobile-threat-monday-a-look-back

Cloud Computing; IS Your Job At Risk?



Technology has been accused of making many a job disappear, like the production line or the accounting office. And it is not done yet.
A company often resembles its communication system. In the era of cloud computing that the tech industry is moving into, that seems to suggest that companies will have smaller departments, quickly analysing data and endlessly experimenting.

That means change is on the way at the many companies that will adopt cloud computing over the next few years.

“Technology shapes styles of work,” said Ed Lazowska, who holds a chair in computer science at the University of Washington. “One critical advantage of the cloud is that sharing becomes dramatically easier.”

A corporate organisational chart from 100 years ago looks like a factory, with little workers at the base like parts, assembled by managers into units that interact with or fit into larger parts. Layers of white-collar jobs died in the “corporate re-engineering” boom 20 years ago, after email and networking replaced middle managers carrying plans among departments.

In cloud computing, computer servers are pooled through management software. Power is dialed up or down depending on the workload, and the system is continually reconfigured. To see how this changes a workplace, look at the structure of the biggest cloud companies around.

“You learn to harness feedback,” said David Campbell, the head of engineering at Microsoft Azure. Early on, this means lots of “A/B testing,” or putting up two versions of a website to quickly see which the customers prefer.

That challenges management. “Instead of having a debate informed by decades of experience around whether a customer would want A or B,” he added, “we define a testable hypothesis, which we quickly try to validate.”


Checking expectations and hypotheses in real time, Campbell said, “takes hours, instead of months and years in the legacy world.” Over the previous quarter, Azure delivered a new feature or service every three days. Amazon announced that so far in 2014, its cloud division had created 60 percent more new products than it did in all of 2013.

At Amazon Web Services, which has built the world’s biggest cloud computing business, work is divided into teams of the smallest size necessary to figure out what the customer is doing with an important product. That team then quickly adapts the product to work better and looks for new insight.

Programmers in Jail?



Need a coder? You might be able to find one in an unlikely place -- behind bars.

 

For the first time, inmates at San Quentin State Prison have the opportunity to learn one of the most coveted skills on the job market. A programming course called Code.7370 is teaching 18 inmates software and web development skills.
The coding class, which launched in October, is taught in an old print shop where inmates are strip-searched before they come and go.
The program stems from The Last Mile, a California nonprofit that teaches prisoners technology and entrepreneurship. The goal is to reduce recidivism and give prisoners hope for a job outside prison.
Many of the inmates learning to code have taken extensive classes on entrepreneurship, building concepts for their own startups and pitching them in front of investors during a prison Demo Day.
Related: The startup staffed by ex-cons
Coding will be the next challenge. The program is competitive and intense: a select group of inmates take the class four days a week, eight hours a day for six months.
"There's no reason why we can't teach someone in San Quentin -- there's many smart people in San Quentin -- to be a very proficient coder," said Chris Redlitz, who co-founded The Last Mile with his wife, Beverly Parenti. "Why not keep those jobs in America?"
Once the coders have graduated from the course, Redlitz and Parenti plan to work with the Prison Industry Authority to get them real programming jobs that pay market rate. Like other fields that employ incarcerated people -- prison call centers, prison furniture manufacturers -- the idea would be that if you're looking for a programmer, you could hire one at San Quentin, which is located just north of San Francisco.
But inmates learning to code behind bars face a significant hurdle -- lack of Internet access. One common panacea for coding quandaries is off limits to them: Google. Instructors from Silicon Valley coding class Hack Reactor teach remotely via Google Hangout, but that is the only outside connection in the room.
"We had to come up with a curriculum and a process that we could simulate a coding environment without actually having an online experience," Redlitz said.
The inmates work in teams of two and an instructor from The Last Mile fields queries and sends them to the help desk team at Hack Reactor.
Related: 30-to-life and pitching a startup
For many, this is their first foray into modern technology.
"I'm in prison for assault. I had a 14-year, 8-month sentence," inmate Aly Tamboura told CNNMoney. "Before I came to prison ... I had a flip phone -- a Nextel... but I don't think it was very smart." Tamboura says the class is giving him a highly marketable skill, preparing him for the modern workforce.
Locked up since the pre-smartphone era, there are prisoners in the course who had never even touched a computer. For them, learning how to use a mouse and learning HTML are coming at the same time.
Motivation for taking the class is twofold: Convicts develop a skillset that could earn them real money while locked up, and could also help them find employment if they are released.
"That's my goal, to become a computer programmer behind bars, to become confident and then to take that skill to the streets ... as I look for the opportunity to start my business," inmate Larry Hinston said. "It's given me hope to continue to strive."

Saturday, 6 December 2014

10 Things The Coming Generations Will Miss

As we are growing up, technology, social behaviour and a couple of other things have changed the way we live life. We bring you ten of them, that have nearly faded but will definitely be missed.Please click on the link below to view.
http://www.indiatimes.com/culture/who-we-are/10-things-the-coming-generations-will-miss-228763.html

Wikileaks Again?

 
The journalistic work by Julian Assange and his extended stay in the Ecuadorean Embassy in London has also inspired the creation of a new BBC comedy series.
Speaking at the Lisbon and Estoril Film Festival on Sunday (LEFFEST), WikiLeaks founder Julian Assange affirmed that the whistle-blowing website is preparing to publish a forth Spy Files – a series of leaked secret documents.
The last Spy Files released by WikiLeaks in 2013, leaked 250 documents from more than 90 surveillance companies that revealed the extent of the secret, global mass surveillance industry.
Assange was vague about the details of the new documents, however, and did not give specific information on the contents or the date of their release.
“I've delegated that to someone else in the organization,” he told an audience in Lisbon via teleconference from the Embassy of Ecuador in London.
Assange also criticized Google for working with the United States government in their efforts to control information and collect data, and rejected the idea that mass surveillance was the most appropriate method to combat terrorism

Friday, 5 December 2014

Chevron Projects 98% Gas Flare Reduction In 2015

Official Chevron Logo
 
Gas Flaring Station

Chevron Nigeria Limited (CNL) has initiated efforts that will see it bring down gas flare in its production fields. The company said current effort will help to significantly reduce gas flaring in its oil fields by 98 percent in 2015 from 60 percent so far achieved .
The managing director of the American oil major, Mr Clay Neff, noted that Nigeria has the capacity to transform from oil to oil and gas production within the next three years.
According to Neff, Chevron would complete existing gas projects under construction as well as make gas produced in deepwater viable and accessible to investors in the market.
Gas Flaring Station


Blackberry Pssport - QHN Phone of the Decade!

The Blackberry Passport Phone was released June this year - 2014. It such a unique and amazing phone with special features like HTML5, 4G Network, supports Wi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, DLNA, hotspot. What phone can be more better than this?  please check the technical specifications for yourself and tell QHN what you think.

General2G NetworkGSM 850 / 900 / 1800 / 1900
3G NetworkHSDPA 850 / 900 / 1900 / 2100
 HSDPA 850 / 900 / 1700 / 1900 / 2100
4G NetworkLTE 850 / 900 / 1800 / 2100 / 2600
 LTE 700/800/850/900/1700/1800/1900/2100/2600
(Bands 1, 2, 3, 4, 5, 7, 8, 13, 17, 20)
SIMNano-SIM
Announced2014, June
StatusAvailable. Released 2014, September
BodyDimensions128 x 90.3 x 9.3 mm (5.04 x 3.56 x 0.37 in)
Weight196 g (6.91 oz)
KeyboardQWERTY
 - Capacitive touch 3-row BlackBerry keyboard
DisplayTypeIPS LCD capacitive touchscreen, 16M colors
Size1440 x 1440 pixels, 4.5 inches (~453 ppi pixel density)
MultitouchYes, up to 10 fingers
ProtectionCorning Gorilla Glass 3
SoundAlert typesVibration, MP3 ringtones
Loudspeaker Yes, with stereo speakers
3.5mm jack Yes
MemoryCard slotmicroSD, up to 128 GB
Internal32 GB, 3 GB RAM
DataGPRSYes
EDGEYes
SpeedHSPA, LTE
WLANWi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, DLNA, hotspot
Bluetoothv4.0, A2DP, LE
NFCYes
USBmicroUSB v2.0 (SlimPort)
CameraPrimary13 MP, 4128 x 3096 pixels, autofocus, optical image stabilization, LED flash, check quality
FeaturesGeo-tagging, face detection, HDR
Video1080p@60fps, check quality
Secondary2 MP, 720p
FeaturesOSBlackBerry 10.3 OS
ChipsetQualcomm MSM8974AA Snapdragon 801
CPUQuad-core 2.26 GHz Krait 400
GPUAdreno 330
SensorsAccelerometer, gyro, proximity, compass
MessagingSMS, MMS, Email, Push Email, IM, BBM 6
BrowserHTML5
RadioFM radio with RDS
GPSYes, with A-GPS, GLONASS
JavaYes, MIDP 2.1
ColorsBlack, White, Red
 - BlackBerry Assistant
- BlackBerry maps
- Organizer
- Document viewer
- Photo viewer/editor
- Video editor
- MP3/WMA/WAV/eAAC+/FlAC player
- DivX/XviD/MP4/WMV/H.264 player
- Voice memo/dial
- Predictive text input
Battery Non-removable Li-Ion 3450 mAh battery
Stand-byUp to 432 h (2G) / Up to 444 h (3G)
Talk timeUp to 18 h (2G) / Up to 23 h (3G)
Music playUp to 84 h
MiscPrice group
TestsCameraPhoto / Video


Thursday, 4 December 2014

Meet Galaxy A7 - Samsung's Slimmest Smart Phone

Samsung is far from done releasing thin, all-metal, mid-range smartphones, judging by a leak at Chinese wireless regulator Tenaa. Though more modest in specs than the Galaxy Alpha, the new 5.5-inch Galaxy A7 is definitely the A-series' alpha model, trumping the Galaxy A5 and A3 phones.RAM, 16GB (non-upgradeable, what? yes non-upgradeable, Samsung may have to answer some questions) memory and 13-megapixel front/5-megapixel rear cameras. The model shown above is strictly for the Chinese market -- to find out whether it'll come to these parts, you'll have to wait for Samsung's official word.
At 6.3mm, it's Samsung's slimmest model ever, and also sports a 1080p screen, 64-bit Snapdragon 615 CPU, 2GB of

Animal Affairs I & II

                                                                Animal Affairs I & II   Chicken I . I am scared for my life. Chicken II...