Wednesday, 13 February 2013

UPDATE on the UPDATE: OK to install the latest version of "Calctimate" calculator for iOS now

As indicated previously, there was a problem with a recent release of the Calctimate calculator for iOS (2.6.0, 07 February 2013).

The bug has been eliminated in the most recent release (2.6.1, 12 February 2013).  Get it at:

https://itunes.apple.com/au/app/calctimate-revolutionary-calculator/id468677289?mt=8&ls=1     / bug crash fix error application release exit SkyPaw /

PayPal & Lenovo launch a new campaign to kill the password with a new standard from FIDO Alliance

"A new standard that gives phones and PCs a bigger role in authentication could disarm attacks that rely on stealing passwords."

http://www.technologyreview.com/news/511001/paypal-lenovo-launch-new-campaign-to-kill-the-password/     / consortium world’s second-largest PC manufacturer launched technology standards reduce reliance password making online accounts more secure device log in account play  central role authentication impossible compromise accounts stealing passwords hackers break into Twitter LinkedIn customers credentials easily retrievable criminals techniques password guessing credential theft websites phishing says Michael Barrett chief information security officer at PayPal cofounder  FIDO Alliance credentials are much more bound  device much harder criminal abscond steal technical specifications being developed get proof device checking security chip that is installed  PC user with hardware fingerprint reader securing personal accounts /

President Obama: If Congress won’t act on climate change, I will

http://gigaom.com/2013/02/12/president-obama-if-congress-wont-act-on-climate-change-i-will/     / market-based market based means fight climate change early first term President Barack Obama urged Congress adopt solutions to fight climate change State of the Union speech consider options like the clean energy and climate bill climate change global warming greenhouse gas CO2 Environmental Protection Agency Clean Air Act EPA natural gas cleaner new oil gas permits research and technology gas burn even cleaner protects air water /

Bacteria – How they are good for you


Credit: Fernan Federici/ Getty Images/ Time

Bacteria in & on our bodies outnumber our own cells 10 or more to one.  Because bacterial cells are much smaller than our own, they only make up 1 to 3% of our body's mass.  That's up to 3 kilograms in a 100 kilo adult.

Not all these bacteria are a disease threat.  In fact, a body without any bacteria would be dead. Or very, very ill.   

So how did these tiny philanthropists get so much bad press?  Well, it's a very complicated story:

Gut bacteria – They are what you eat
http://healthland.time.com/2011/09/06/gut-bugs-they-are-what-you-eat/

Good bacteria – How the germs in your body keep you healthy
http://healthland.time.com/2012/06/14/the-good-bugs-how-the-germs-in-your-body-keep-you-healthy/

What do gut bugs have to do with high cholesterol? A Lot
http://healthland.time.com/2011/10/14/what-do-gut-bugs-have-to-do-with-high-cholesterol-a-lot/

The human microbiome – Scientists decode the genes of the millions of bacteria that keep the human body healthy
http://healthland.time.com/2012/06/14/the-good-bugs-how-the-germs-in-your-body-keep-you-healthy/

Connection between dirty diapers & childhood health
http://healthland.time.com/2013/02/12/the-connection-between-dirty-diapers-and-childhood-health/?iid=hl-main-lead / bug germ intestine digestive tract nappy nappies /

Counting raindrops • new development in weather forecasting

http://www.economist.com/news/science-and-technology/21571384-how-use-mobile-phone-networks-weather-forecasting-counting-raindrops     / East Coast United States recovers Nemo importance weather forecasting become clear elegant solution age-old problem measuring rainfall measured satellites lack detail old fashion fashioned rain collection gauges have detail but don’t cover much land area degrade cell phone reception researchers invented developed system uses cellphone signals determine rainfall in an area detail rain gauges wide coverage of satellites most regions have cell phone reception information measured in realtime real time unlike satellites gauges areas without cell phone coverage weather forecasters help build cell stations towers to better measure weather data cell phone reception technology limitations measuring snow or hail technology limitations test runs /

Samsung-Apple rivalry analysis: Samsung happy to follow the leader

http://bgr.com/2013/02/11/samsung-apple-rivalry-analysis-nyt-324592/?utm_source=hitlist-sb&utm_medium=home     / Samsung leader consumer electronics industry South Korean company newcomer smartphone market dabbling with Android dominating handset shipment volumes sold estimated 63 million smartphones channels last quarter $6.6 billion in profit heat copying Apple’s designs formula is clearly working  recent interview top executive Samsung happy to follow other companies lead New York Times Brian X. Chen Apple-Samsung rivalry Apple focusing rise in popularity Apple AAPL has seen a true competitor since launching the iPhone Apple focuses on creating new markets dominating them Samsung entering existing markets and growing within them We get most of our ideas from the market Samsung EVP executive vice president Kim Hyun-suk Chen interview market is a driver Apple recent products have entered existing markets devices have offered innovation and clear benefits iPhone iPod obvious examples  strategy always something new and different to breaks into a new market refinement. Samsung Galaxy smartphone Galaxy Note phablet niche marketfollowing cheaper iPhone /

Latest trial of a virus engineered to kill cancer shows promise

http://arstechnica.com/science/2013/02/latest-trial-of-a-virus-engineered-to-kill-cancer-shows-promise/     / scientists working engineer virus attack cancer basic idea is sound promising-looking results tumor shrinking infection viruses small trials companies Medicine promising results different approach ensuring virus leads death of cancer cells revs immune system to attack them result clinic opportunity review general approach of treating cancer with viruses basic idea leverage decades common viruses research has identified a variety of mutations keeping viruses from growing in normal cells inject virus into a healthy individual it won't be able to infect any of their cells cancer cells are different carry a series of mutations of their own p53 protein normally induces aberrant cells to undergo an orderly death called apoptosis shut down the growth of viruses in a cell some viruses encode a protein that inhibits p53 damage eliminate copies of p53 so that it doesn't cause them to undergo apoptosis virus p53 inhibitor deleted can't grow in normal cells hey have p53 can grow in cancer cells eliminated their p53 cancer-killing virus great idea viruses dropped after preliminary trials new trial similar approach vaccinia smallpox used for vaccines carries a gene essential make copies of itself researchers have engineered a version without that gene ensuring can't grow in normal cells gene shut down cancer cells reactivate the gene hospitable environment mutant virus researchers insert inserting gene molecule recruit immune cells granulocyte-macrophage colony-stimulating factor GM-CSF immune system plays an important role in controlling cancer doesn't always generate a full-scale response to cancer bring immune cells to the site of the cancer and activate them creating a more aggressive immune response to any cells that survive viral infection study checking tolerance two different doses virus tolerated well tolerate subjects reported bout of flu-like symptoms only one subject out of 30 had a more severe response tumors did respond placebo-controlled trials low-dose group survival time higher dose group imaging of tumors showed lots of dead cells tests immune system virus generated robust response clinical trials company engaged in phase 2 trials designed identify treatment large-scale effectiveness trial promising results /

Is it you cleaning the screen or the AutoMeeS?


Credit: Takara Tomy/ The Gadgeteer

Roomba robot for your tablet screen? :)

http://the-gadgeteer.com/2013/02/12/is-it-you-cleaning-the-screen-or-the-automees/ / AutoMeeS  Takara Tomy tablet smart phone screen-cleaning tool device automatically cleans screen looks like  miniature Roomba detect the edge device so it will not fall off the edge detection toy useful tool /

Viruses, Trojans, & worms, oh my: The basics on malware

http://arstechnica.com/security/2013/02/viruses-trojans-and-worms-oh-my-the-basics-on-malware/     / post-PC world malware major problem home computer users businesses steal information upload computers controlled by hackers critical systems US power plants infected with malware spread by USB drives Dexter stole credit card data from point-of-sale terminals at business espionage-motivated computer threats Online Security infect affect computers viruses worms, Trojans ransomware replicate themselves spread from computer to computer targeting deleting data stealing information attached to an executable file not be active or able to spread until a user runs or opens the malicious host file or program Cisco notes host code is executed, the viral code is executed as well normally, the host program keeps functioning after it is infected by the virus overwrite other programs with copies of themselves destroys the host program viruses spread software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself entire computer networks destructive worms ever unleashed on the Internet was dubbed Slammer Trojans do not replicate themselves Trojan horse of ancient Troy because they disguise themselves as legitimate, harmless programs to convince users to install them activated, it can achieve any number of attacks on the host irritating the user popping up windows or changing desktops damaging the host deleting files stealing data activating spreading other malware such as viruses create back doors to give malicious users access to the system attacks combine attributes blended threats that may spread more effectively and be harder to defend against sub-categories backdoor remote access Trojan information stealer ransomware rootkit botnet hack hacking hacker sneak attack access infected system bypassing security undocumented OS network functions innocent-looking phishing e-mails Recruitment Plan Excel file embedded Adobe Flash file installed the backdoor Outlook object executed by Microsoft Excel targeting  vulnerability allowing the execution of code Poison Ivy backdoor connects back to servers operated by malicious users attacker has full remote access to the infected workstation full access to network drives that the user can access Remote Access Trojan RAT malicious administrative tool root access compromised machine user interface client component attacker can use to issue commands to the server component residing in the compromised machine keyloggers desktop recorders and memory scrapers steal passwords financial credentials proprietary data advantage monetize encrypt the PC’s data to prevent the user from accessing it locking the user out of the whole system threatening destruction of the machine with a Trojan HTML JavaScript markup programming languages that power much of the Web Java attacks browsers visiting  malicious website legitimate website infected by hackers drive-by downloads infect exploit exploits vulnerabilities in a browser or plugin updates patch vulnerabilities bugs spam e-mail attachment downloading download infected file from the Internet User Account Control to prevent applications from installing without user consent Defenses address space layout randomization data execution prevention exploit vulnerabilities /