GPS satellites transmit on two legacy radio frequencies. The unencrypted code used by most civilian GPS units is transmitted only on the L1 frequency. The encrypted P code for military users is transmitted on both the L1 and L2 frequency. If the Iranians could jam the encrypted military code on the L1 and L2 frequencies then the drone’s GPS receiver might reach out to use the less secure code to get directions. Without encryption, it would be possible for an enemy to fool a drone into thinking it was elsewhere. While possible in theory, other GPS experts say it is a difficult feat and they express doubt that the exploit happened. Some analysts think another possibility is that the aircraft malfunctioned independent of any Iranian electronic interference. Further doubt is expressed not only over whether it was technologically possible for them to overtake the navigation system but also to bring it down with such minimal damage to it. John Pike, defense expert from GlobalSecurity.org, was quoted as saying he thought the drone exhibited by the Iranians looked like a parade float in that it was remarkably intact. RQ-170 Sentinel. © TruthDowser / Wikimedia Commons / CC-BY-SA-3.0 Group shows botnet threat in the future may come from the sky This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. © 2011 PhysOrg.com (PhysOrg.com) — In the aftermath of the Iran capture of a US military drone earlier this month now come arguments over how Iran managed to pull it off. An Iranian engineer’s exclusive interview with The Christian Science Monitor has been published, which details how the Iranians captured the drone through jamming. An opposing camp says the story is just that, a story, while others schooled in GPS systems say that the Iranians’ technique is technically possible but they would not bet on it. Explore further Citation: RQ-170 drone’s ambush facts spilled by Iranian engineer (2011, December 17) retrieved 18 August 2019 from https://phys.org/news/2011-12-rq-drone-ambush-facts-iranian.html Iran’s story about the electronic ambush of America’s sophisticated drone, the RQ-170 Sentinel, is that their experts used their technology savvy to trick the drone into landing where the drone thought was its actual base in Afghanistan but instead they made it land in Iran. They used reverse engineering techniques that they had developed after exploring less sophisticated American drones captured or shot down in recent years. They were able to figure how to exploit a navigational weakness in the drone’s system. “The GPS navigation is the weakest point,” the Iranian engineer told the newspaper.Iranian electronic warfare specialists were able to cut off the communications link by jamming on the communications. The engineer said that they forced the drone into autopilot. That state is where “the bird loses its brain.” The Iranians reconfigured the drone’s GPS coordinates and they used precise latitudinal and longitudinal data to force the drone to land on its own. In doing so the Iranian team did not have to bother about cracking remote control signals and communications from a control center in the U.S., and the RQ170 suffered only minimal damage, according to the report.Adding strength and credibility to that story were military experts saying that even a combat-grade GPS system is vulnerable to manipulation. According to a GPS expert at the University of New Brunswick in Canada, Richard Langley, it’s theoretically possible to take control of a drone by jamming.
© 2011 PhysOrg.com Explore further More information: Metamaterial ‘Gecko Toe’: Optically-Controlled Adhesion to Any Surface, arXiv:1201.2801v1 [physics.optics] arxiv.org/abs/1201.2801AbstractOn the mesoscopic scale, electromagnetic forces are of fundamental importance to an enormously diverse range of systems, from optical tweezers to the adhesion of gecko toes. Here we show that a strong light-driven force may be generated when a plasmonic metamaterial is illuminated in close proximity to a dielectric or metal surface. This near-field force can exceed radiation pressure and Casimir forces to provide an optically controlled adhesion mechanism mimicking the gecko toe: at illumination intensities of just a few tens of nW/um^2 it is sufficient to overcome the Earth’s gravitational pull. The whole idea is based on the fact that light exerts a force on materials that it strikes. The research team used this force to create plasmons (oscillations of electrons) on the surface of a metamaterial – in this case, a substance made of mostly gold with optical properties that can control the way light behaves. They found that when light was shined through the metamaterial onto the interface between a metamaterial and the surface of another metal material an attractive force was created due to the oscillating electrons on the metamaterial interacting with the electrons on the second material. This result was not unexpected, the amount of force found however, was. They found that by adjusting the light source to a frequency close to the wavelength of the oscillating electrons on the surface of the metamaterial, they could produce an attractive force greater than the pull of gravity on the two materials.The model the team has built demonstrates that it should theoretically be possible to create materials that are able to stick to and release from one another by simply turning a light source on and off, at least at the quantum level. If applied research finds the model holds, new metamaterials might be made that could be used for such applications as moving nano-sized objects around with tools equipped with a light source and metamaterials.There is one still one more step in this new research, of course, and that is actually finding the force in a real life experiment and measuring it. The team said this shouldn’t be difficult and expect that it will be found within the next couple of weeks or months. Citation: British team builds model showing metamaterials could be used to create gecko toe like adhesion (2012, January 27) retrieved 18 August 2019 from https://phys.org/news/2012-01-british-team-metamaterials-gecko-toe.html Gecko toes and their optical analogue. a, Gecko toes sticking to a smooth glass wall. b, Artistic impression of a metamaterial ﬁlm attracted by a beam of light to a dielectric surface. Image: arXiv:1201.2801v1 (PhysOrg.com) — Scientists have long been enamored by the gecko’s gravity defying ability to cling to walls and to let go at will, allowing it to walk around sideways, as have Spiderman enthusiasts. Thus far, unfortunately, efforts to duplicate such feats have gone unmet. Now however, researchers from the University of Southampton in England have built a computer simulation that shows that it might be possible to duplicate the gecko’s abilities by using special metamaterials and ordinary light. They have published the results of their studies on the preprint server arXiv. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. ‘Darker-than-black’ metamaterial could lead to more efficient solar cells
(Phys.org) — A piece of malware categorized as a malicious rootkit can spread via an installer disguised as an Adobe Flash Player installer and is capable of spreading to four different platform environments, including Windows, Mac OSX, VMware virtual machines, and Windows Mobile devices. The news this week is that the malware, dubbed Crisis, not only affects Macs, as originally assumed, but these other systems as well. The discovery is an example of expert security companies building on each other’s efforts. Explore further Citation: Malware can take ugly leap forward to virtual machines (2012, August 23) retrieved 18 August 2019 from https://phys.org/news/2012-08-malware-ugly-virtual-machines.html More information: www.symantec.com/connect/blogs … aks-virtual-machines This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. In July, security sleuths got the ball rolling in reporting that there was a Mac Trojan, dubbed Crisis, intercepting e-mails and tracking web sites. Kaspersky Lab said that it arrives on a compromised computer through a JAR file by using social engineering techniques. Symantec said it was beyond Mac and targeting Windows users. They saw executable files for more than one operating system.For those who follow the well beaten path of tricks that malware authors use to lure victims, it all sounds too familiar. There they are again, the two words, Adobe Flash. Crisis is distributed using social engineering techniques designed to trick users into installing a Java archive file masquerading as an Adobe Flash installer. It makes itself look like the installer and proceeds to deliver a corresponding JAR file to infect the system.But there is something not at all familiar, rather, annoyingly new. “This may be the first malware that attempts to spread onto a virtual machine,” said Takashi Katsuki, a researcher with Symantec. He thinks of it as a very unwelcome leap forward. Malware threats in the past tend to terminate themselves when they find a virtual machine monitoring application, such as VMware, to avoid being analyzed. Instead, this time, the malware authors have embraced VMware. Crisis can look for a VMware virtual machine image on the compromised computer and, finding it, the malware copies itself onto the image using the VMware Player tool. The VMware Player tool allows multiple operating systems to run on the same computer. “VMware Player is the easiest way to run multiple operating systems at the same time on your PC,” according to the company’s site. “With its user-friendly interface, VMware Player makes it effortless for anyone to try out Windows 8 developer release, Windows 7, Chrome OS or the latest Linux releases, or create isolated virtual machines to safely test new software and surf the Web.”According to Symantec, though, Crisis does not leverage any vulnerability in VMware’s software itself but merely takes advantage of an attribute of all virtualization software, that the virtual machine is a file or files on the disk of the host machine.The Windows version of Crisis can spread to Windows Mobile devices connected to compromised computers by installing a module on the device. Android and iOS devices are not affected.In sum, the malware can sneak into a VMware virtual machine and drop modules onto a Windows Mobile device using Remote Application Programming Interface.Its payback includes an ability to record Skype conversations, monitor instant messaging programs and track websites visited in Firefox or Safari.Kaspersky Lab’s assessment has been that this is no work of amateurs. Sergey Golovanov, in a July posting, found the modules were written professionally and, “from the code we can see that the cybercriminals developed this Trojan in order to sell it on hacker forums.”Similarly, Intego, an antivirus software company, pegged Crisis as “a very advanced and fully-functional threat,” and noted that some of the malware’s code originated with commercial spying software.Symantec said the malware has infected less than 50 machines. Hackers hitting Macs with virus: industry experts © 2012 Phys.org
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Most everyone has heard dog-directed speech, which is similar to speech patterns some use when talking to infants—the voice gets higher, the words come out slower and there is a sort of sing-song phrasing. Some of the phrases are familiar as well, such as “Who’s a good boy?” In this new effort, the researchers looked into the use of dog-directed speech seeking to learn if there might be any modulating factors in its use.The experiments consisted of asking 30 female human volunteers to look at pictures of dogs while reading a script consisting of typical dog-directed speech phrases into a microphone to make recordings. The recordings were then played to 10 puppies and 10 adult dogs at an animal shelter as the researchers watched and recorded their reactions.The researchers report that the volunteers tended to raise their voices in ways similar to people speaking to human infants regardless of the age of the dog they were looking at, though it was noted that the voices were raised slightly higher for puppies than for adult dogs. They also report that at the animal shelter, the puppies responded very clearly to the voices coming from the speakers, acting as if they wanted to play. The adult dogs, on the other hand, after a quick investigation, ignored the recordings altogether.The researchers were not able to explain why the humans spoke in dog-directed speech or why the puppies responded to it while the adult dogs did not, but suggest that humans likely respond to puppies in much the same way they respond to babies—and babies have been shown to respond more to baby-directed speech. As for why the older dogs were not interested, it might have been the case that they were simply older and wiser—they could see very clearly there was no human present speaking to them, so they chose to ignore whatever was being said. (Phys.org)—A small team of researchers from the U.S., the U.K. and France has found that puppies are more receptive to dog-directed speech than are adult dogs. In their paper published in the journal Proceedings of the Royal Society B, the researchers describe experiments they conducted recording human voices and playing them back to dogs, what they found, and what it might mean for human communications. Journal information: Proceedings of the Royal Society B Explore further Citation: Study shows dog-directed speech more effective on puppies than adult dogs (2017, January 11) retrieved 18 August 2019 from https://phys.org/news/2017-01-dog-directed-speech-effective-puppies-adult.html Does your dog love you? © 2017 Phys.org Credit: CC0 Public Domain More information: Tobey Ben-Aderet et al. Dog-directed speech: why do we use it and do dogs pay attention to it?, Proceedings of the Royal Society B: Biological Sciences (2017). DOI: 10.1098/rspb.2016.2429AbstractPet-directed speech is strikingly similar to infant-directed speech, a peculiar speaking pattern with higher pitch and slower tempo known to engage infants’ attention and promote language learning. Here, we report the first investigation of potential factors modulating the use of dog-directed speech, as well as its immediate impact on dogs’ behaviour. We recorded adult participants speaking in front of pictures of puppies, adult and old dogs, and analysed the quality of their speech. We then performed playback experiments to assess dogs’ reaction to dog-directed speech compared with normal speech. We found that human speakers used dog-directed speech with dogs of all ages and that the acoustic structure of dog-directed speech was mostly independent of dog age, except for sound pitch which was relatively higher when communicating with puppies. Playback demonstrated that, in the absence of other non-auditory cues, puppies were highly reactive to dog-directed speech, and that the pitch was a key factor modulating their behaviour, suggesting that this specific speech register has a functional value in young dogs. Conversely, older dogs did not react differentially to dog-directed speech compared with normal speech. The fact that speakers continue to use dog-directed with older dogs therefore suggests that this speech pattern may mainly be a spontaneous attempt to facilitate interactions with non-verbal listeners.
Kolkata: Researchers from IIT Kharagpur and Oxford University have entered into a collaboration to develop a better understanding of the filtration process of water and cope with global water challenge. While the collaboration is addressing arsenic contamination of water for drinking and other types of human use, the research has been extended to filtration of other water pollutants as well, an IIT KGP statement said today.Pointing out that the Ganges-Brahmaputra Delta is a global hotspot for arsenic groundwater contamination, the statement said, chemical leaching within fertile farmland soils, as a result of overuse of pesticides and fertilizers, is also widespread in the country. Also Read – Heavy rain hits traffic, flightsResearchers at the IIT KGP, led by Prof Sirshendu De of the chemical engineering department, recently developed an ultra-low cost, novel technology by chemically activating naturally available laterite that acts as an adsorbent to filter arsenic.”Based on our research at IIT KGP, filtered water can now be produced at just 2 paisa per litre, thus making it ideal for a country like India,” Prof De said. This part of developing ultra-low cost novel technology had been done by the IIT KGP team only. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedA team of mathematicians from Oxford University, led by Dr Ian Griffiths, then worked on the mathematical modelling techniques which helped extending the life of the filter and the design of scaled-up filters.”Inter-disciplinary approaches are becoming increasingly important to make progress in present-day challenges and this project is a clear example of such a case,” Prof Griffiths said.The collaborative developed technology has already been accepted by the Department of Science & Technology, Union Government, PHE department government of West Bengal and the West Bengal Arsenic Task force.The collaborative project has been funded by the Global Challenge Research Fund (GCRF-UK), University of Oxford.
Kolkata: The e-mail id of Jadavpur University vice-chancellor Suranjan Das has been hacked. The V-C, who is a resident of FE Block in Salt Lake, has lodged a complaint with Bidhannagar Cyber Crime Police station on Wednesday. A senior police officer of Bidhannagar Cyber Crime police station has informed that according to Das’s complaint, someone has created a profile on Hotmail with the same name as him, while his actual account is on Yahoo. The hacker has been sending frivolous e-mails, seeking personal and professional help on Das’s part, from some persons who are in the mail list of the V-C. Also Read – Heavy rain hits traffic, flightsWhen contacted, Das said, “I have a number of respected and renowned persons in my e-mail contact list. I had received calls from some of them on Tuesday night, who enquired whether I am sick and then asked whether I have sought any sort of financial help from them. I informed them immediately that I have sent no such mail and told them not to respond to such requests of financial help. I was relieved that no one had transferred any money and had called me first,” Das maintained.He expressed his apprehension that the hacker might have access to some very confidential e-mails that he has to deal with, being the head of a university. “The police have been very cooperative. They have taken all necessary steps in this regard and I am hopeful that they will soon nab the offender,” he said.
Kolkata: The Directorate of Revenue Intelligence (DRI) seized a huge quantity of methaqualone, a narcotic substance that costs around Rs 2.35 crore in the international market.Two persons were arrested in this connection and they were produced before Barasat Court. Acting on a tip-off, DRI officers conducted a raid and arrested two persons from near the International Departure gate of Kolkata Airport.The consignment was sent from Chennai. A metal box was parceled from Chennai. It reached Howrah Station on Chennai Mail and was collected by a person from the station. The same person passed the consignment to his counterpart, who was supposed to take it to Kuala Lumpur. Also Read – Heavy rain hits traffic, flightsThe officers searched the box and found some garments in it. Later, they realised that the sides of the box were thicker than usual and found that eight packets containing 4.7 kg of methaqualone were concealed along the width of the box.In another development, the DRI officers have arrested one person from New Jalpaiguri Railway Station in North Bengal, when he was carrying gold that was brought from Myanmar. Firoz Seikh, who was arrested, is a resident of North 24-Parganas. Gold weighing around 2 kg was found from him, worth around Rs 63.27 lakh.The gold bars were smuggled from Myanmar through Moreh in Manipur, investigation revealed. One more person was arrested in Manipur on similar charges.It may be mentioned that in the 2017-18 fiscal, DRI has seized around 430 kg of gold and gold jewellery from the East and North-East regions, which is worth more than Rs 110 crore.
Kolkata: The Bandhu Kolkata initiative organisedjointly by the state Women & Child Development & Social Welfare department and Kolkata Police, will be effective during Durga Puja from the day of Sasthi till the morning of Dashami.”During the Pujas, a huge number of people from the districts come to the city to soak in the festive spirit. There are cases of children getting estranged from their parents amidst the crowd. At the same time, girls, young women and the elderly become the soft target of miscreants. This Bandhu Kolkata initiative is aimed at curbing such practices,” a senior official of the department said. Also Read – Rain batters Kolkata, cripples normal lifeThere will be eight well-decorated child-friendly vans, one each in the eight divisions of Kolkata Police, which will rush to a pandal in case of a person or a child getting estranged from their family in the crowd.The Puja committees will have facilities of announcement and as soon as there is report of any problem, the quick response teams,especially those that work for rescue and restoration of missing children, distressed women or elderly persons, will be on alert. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killed”We will set up three outlets at Rajballavpara near Jagat Mukherjee Park, Sealdah and Mudiali, where essential articles like medical first-aid boxes, water bottles, dry food, soft toys, sanitary napkins and wheelchairs will be available,” said Shashi Panja, Minister of State for Women & Child Development & Social Welfare department.A number of NGOs that are stakeholders of the department, have extended their support for better service to the community.A person needs to remember the emergency numbers: 100,1098, 1091 and 9002999999 (available from Sasthi to Dashami morning) to access facilities of the Bandhu Kolkata app.A number of homes for women and children will also be ready to extend services during the Pujas.
Kolkata: A three-year-old girl was allegedly sexually harassed by her neighbour at Bakultala in South 24-Parganas. Later, police arrested the accused Noor Alam Mollah. The child has been admitted to Neempith Rural Hospital. According to the sources, on Sunday afternoon, the child was playing with her elder sister in front of their house in Tilipukur village. Her mother went somewhere and her father was sleeping inside the house. For a while, the victim’s sister went inside the house and when she came back, she found her sister to be missing. Also Read – Rain batters Kolkata, cripples normal lifeShe informed her father and both of them went to search her. After a few hours of searching, neighbours noticed that the girl was coming out from Mollah’s house crying. On asking, she said Mollah sexually harassed her when she went to check if her mother was coming back. The child was immediately taken to a local hospital and police was informed. Later, Bakultala police station arrested Mollah on charges of rape.
Showing compassion to others can help reduce depression and increase life satisfaction, say scientists who found that the most disagreeable individuals benefit the greatest.The most disagreeable individuals, who are also the least likely to be kind, can benefit most from behaving more compassionately, a York University study has found.More than 640 people who were mildly depressed took part in the study which tracked the results of online compassion training. Also Read – Add new books to your shelfResearchers from York University in Canada asked the participants, who were on average in their mid-30s, to take part in one of three online compassion intervention exercises including a control condition.They were asked to complete their exercise and report back via an online platform every other day for three weeks.Two months later, disagreeable participants who performed acts of kindness in close relationships showed the greatest reductions in depression and greatest increases in life satisfaction. Also Read – Over 2 hours screen time daily will make your kids impulsive”As a result of their hostility and lack of cooperation, disagreeable types risk getting rejected or ostracised. There is a lot of conflict in their relationships, and they suffer the consequences, said Myriam Mongrain, a professor at York.We found that providing concrete suggestions to those individuals, giving them ways in which they could express empathic concern in their close relationships was tremendously helpful,” said Mongrain.Highly disagreeable people often lack empathy, even in their close relationships, said Mongrain. “Implementing these new behaviours might have left them feeling affirmed and liked in their close social circle. This might have been the anti-depressant ingredient in this group,” she said.The findings are particularly noteworthy given that the interventions were administered online and only required 10-15 minutes every other day. In other words, it was easy to implement, could be administered worldwide and had profound effects for some individuals.In another exercise condition, participants were asked to spend up to 10 minutes meditating on nurturing phrases such as “May you be happy” or “May you be safe.” This exercise was of benefit to participants as a whole. However, when examining interactions effects with the disagreeable personality variable, the researchers found that it was the kindness exercise that was most helpful for this subgroup.Researchers say the results could have immediate practical applications for social scientists, policymakers, psychology researchers, and health practitioners.The widespread application of compassion interventions could contribute to a more humane and kinder society, particularly when targeted at those proneto hostility.
In the 1920s American writers F. Scott Fitzgerald and Ernest Hemingway were living in Paris amongst a group of like-minded artists known as ‘The Lost Generation.” The young men were friends, sharing a love of literature and drink, though from the outside they appeared very different. Fitzgerald was a more artful type, whereas Hemingway had a comparatively action-packed background and enthusiasm for sports. According to Biography.com when he “wasn’t writing, Hemingway spent much of the 1930s chasing adventure: big-game hunting in Africa, bullfighting in Spain, deep-sea fishing in Florida.”Ernest Hemingway’s 1923 passport photograph.Writing for The Atlantic in 2009, the author Christopher Hitchens recalls Hemingway’s own description of Fitzgerald, saying he “looked like a boy with a face between handsome and pretty. He had very fair wavy hair, a high forehead, excited and friendly eyes and a delicate long-lipped Irish mouth that, on a girl, would have been the mouth of a beauty.”The article reviewed a reissue of Hemingway’s memoir A Moveable Feast, published three years after his death in 1964, which gave readers an insight into his time in the French capital.F Scott Fitzgerald, 1921.This heady social scene was shown in the Woody Allen 2011 movie Midnight In Paris, where Corey Stoll played Hemingway and Tom Hiddleston, Fitzgerald.Hemingway was rugged, whereas Fitzgerald arguably had more in common with the “café society” culture. The former wrote novels such as The Old Man and the Sea and the latter’s most famous work was The Great Gatsby. However there was much that united them, not least depression.In fact their closeness resulted in an infamous and intimate exchange that Hemingway chose to commit to the page in the chapter of A Moveable Feast called ‘A Matter of Measurements.’American novelist Francis Scott Key Fitzgerald (1896-1940) and wife Zelda sitting on the lawn at her mother’s home. Photo by Time Life Pictures/Mansell/The LIFE Picture Collection/Getty ImagesHemingway’s friend had married Zelda Fitzgerald in 1920, a relationship that took a tragic turn when her own issues led to a diagnosis of schizophrenia. Years earlier, the men were sitting in a Parisian restaurant when F. Scott made a startling confession to his no-nonsense pal.Hitchens quotes Fitzgerald’s lament: “Zelda said that the way I was built I could never make any woman happy and that was what upset her originally. She said it was a matter of measurements.” They were within range of the Eiffel Tower, but it was another structure that was preoccupying the writer’s thoughts.The Eiffel Tower, Paris, France.Fitzgerald went on to say “I have never felt the same since she said that and I have to know truly.” It was a remark that would unsettle any man, and he looked to Hemingway for guidance on the matter.What unfolded next was a fairly typical male scene, albeit given a bizarre dimension by its legendary participants. Going into the men’s room, Hemingway gave his honest assessment of Fitzgerald’s situation.Hemingway (left), with Harold Loeb, Duff Twysden (in hat), Hadley Richardson, Donald Ogden Stewart (obscured), and Pat Guthrie (far right) at a café in Pamplona, Spain, July 1925. Twysden, Loeb, and Guthrie inspired the characters Brett Ashley, Robert Cohn, and Mike Campbell in “The Sun Also Rises.”The news was good for the young scribbler — everything seemed perfectly normal. Hemingway went on to comment that the problem was more a question of Fitzgerald’s angle of examination rather than anything else.F. Scott Fitzgerald and wife Zelda September 1921.The Atlantic piece goes on to suggest that Hemingway was flattering his friend somewhat to cover any embarrassment, though this was really one of those cases where you had to be there at the time. Whether someone would have wanted to be there at the time is another thing entirely.Fitzgerald and Hemingway went on to make their mark on the printed page. The latter was acknowledged during his lifetime, especially with a Pulitzer Prize for The Old Man and the Sea.Read another story from us: Unpublished Hemingway War Story Finally Sees the Light of DayFitzgerald wasn’t so fortunate. He had his triumphs, but true recognition only came after his death with a reappraisal of The Great Gatsby and its depiction of the times. Times he drew upon from his days spent in Paris alongside Hemingway and company.
In 1985, Dr. Robert Ballard of the University of Rhode Island in Narragansett and the Mystic Aquarium and Institute for Exploration in Connecticut found the long elusive shipwreck of the Titanic. At the time, he was working with Woods Hole Oceanographic Research Institution in Massachusetts. Dr. Ballard designed two underwater vessels, the Argo, capable of squeezing into tight places and sending live pictures to a monitor and the Alvin, which could take several people down to the ocean floor.Robert Ballard (the man who found Titanic, Bismarck, USS Yorktown, and JFKs PT-109). Photo by Erik Charlton CC BY 2.0For all of the money and time spent, the discovery of the Titanic was just a side note of a much bigger mission and just happened to yield results. Dr. Ballard was on a secret mission to study the radioactivity of two submarines, the USS Scorpion, sunk in 1968, and the USS Thresher, sunk in 1963 during the Cold War. The Scorpion was carrying nuclear weapons, and both ships had a nuclear reactor. To keep the mission secret, the US Navy and Dr. Ballard claimed he was looking for the Titanic.USS scorpion (SSN-589)The true details of the mission were not released until 2017, and, as it turns out, the Titanic was fairly close to the two submarines. When Dr. Ballard — a Navy veteran — received his orders, he was told that the submarines were of paramount importance and that if there was time after studying the subs for radioactive leakage, he could look for the Titanic. They never expected him to find it, and the subsequent publicity became a major headache for the Navy.According to military.com, the USS Scorpion was a Skipjack-class nuclear submarine home based in Norfolk, Virginia. She was on a classified mission to track Russian submarines in the Mediterranean Sea and left Virginia in October of 1967. In May 1968, the Scorpion left Spain for home and was due in port on May 27th.U.S. Navy photo of the bow section of Scorpion taken by the crew of Trieste II, 1968When the sub had not arrived several hours after its scheduled time, the Navy launched a search. On June 5th, it was announced that the Scorpion and its crew of 99 were presumed lost. The Navy has never been able to say for sure what caused the Scorpion to sink, but, due to Dr. Ballard’s photos, it is believed that an accidental torpedo explosion was the cause.With no definitive proof, many have made up their own answers such as a Russian attack and a Navy coverup. The Navy refused the request made by the U.S. Submarine Veterans in November 2012 to reopen the case. The wreck is located about 400 nautical miles from the Azores.Check out 7 Things you Probably Didn’t Know About the Titanic:USS Thresher was performing deep-diving tests off the coast of Cape Cod, Massachusetts on April 10, 1963, when it sank, losing 129 men. She left Portsmouth on April 9th and proceeded to do test trials accompanied by the rescue ship USS Skylark. Several different tests were performed with the sub staying submerged overnight. The next day, the sub reestablished communications with the Skylark and began even deeper dives. As she approached the test limit, Skylark received two jumbled messages and then nothing.USS Thresher (SSN-593) underway, April 30, 1961The Navy sent ships to search for the missing sub but by April 11th the Thresher was declared lost with all hands. The search continued underwater, however, and the wreck was discovered, according to military.com, showing that the Thresher had imploded and spread debris over 35 acres.Expeditions to the wreck site in June and August took pictures, and an inquiry, aided by the 1963 photographs and Dr. Ballard’s photographs, determined the reactor had shut down causing the sub to sink and implode at about 2,000 feet under the water. The Navy determined that a high-pressure pipe which provided the nuclear reactor with cooling water had blown.Ballard in 1999. Photo by Kingkongphoto & www.celebrity-photos.com CC BY-SA 2.0The search for the two submarines aided Dr. Ballard in finding the Titanic as he learned not to look for parts of the ship but to find the trail of debris which would lead to the ship. Using this technique led Dr. Ballard to find dishes, leather goods, and fixtures which led to the giant boilers and then to the two parts of the broken ship lying on the ocean floor.Dr. Ballard and his teams have also discovered the remains of the German battleship Bismarck; second world war ship USS Independence and submarine USS Bugara, as well as several other ships. It was also their work that first confirmed the existence of hydrothermal vents in the ocean.Read another story from us: The White Star Lines First “Titanic” Sailed in 1854 – And Met the Same FateAccording to National Geographic, when asked if he will be performing more missions for the Navy, Dr. Ballard remarked, “The Cold War is over, I’m no longer in the Navy”– but who knows for sure?
Granny-style free throws have long been taboo in the NBA. Rick Barry became the NBA all-time NBA leader in free throw percentage shooting underhand, but since his departure it’s all but disappeared.It’s so uncool that players in the modern NBA would rather shoot 50% from the line, than almost certainly improve their percentage shooting underhand.Apparently, Rockets rookie center Chinanu Onuaku is more concerned with getting buckets than style points. Last night, the rookie out of Louisville threw being cool to the wind when stepped to the line for his first two career NBA free throws and shot both attempts “granny style”.He nailed them both. Soft touch, friendly roll. What’s not to like? No matter what you think about underhand free throws, getting buckets is always cool. Do it DeAndre Jordan. Do it.Rockets rookie Chinanu Onuaku makes the first two free throws of his NFL career – underhand pic.twitter.com/8ZjqvDZpUD— Tommy Beer (@TommyBeer) December 27, 2016 Advertisement
Lillard eclipses Westbrook Damian Lillard knocked the Thunder out in the first round with his 40-foot buzzer beater over Paul George, capping off a clutch 50-point Game 5. Russell Westbrook manufactured a beef with Lillard throughout the series, but was ultimately outplayed in every conceivable fashion by Portland’s star ij another humiliating playoff exit.Westbrook finished the night with 29 points, but needed 31 shots to get there, and showed again why his game isn’t built for playoff success. In an NBA that values efficiency and shooting, Westbrook has been eclipsed by Lillard. It’s time for him to step back and concede Paul George is now the franchise’s best player, even though he won’t. Also:-Lillard’s buzzer beater isn’t a bad shot in today’s NBA-Buy, Sell or Hold-Kyler Murray needs a team to go all-in on the good and bad– Guests:Nick Wright, Ric Bucher, Enes Kanter, and Jim Jackson
12.1-inch display, Wi-Fi, three-year warranty 4 min read 2.8 pounds 1.2GHz Pentium M $1,998 30GB 512MB RAM Ready to get on the road? A powerful ultraportable lets you take what you need and still pack light. (800) FUJITSU www.shopfujitsu.com 2.5 pounds 1.1GHz Pentium M $1,999 CONTACT 30GB 512MB RAM Fujitsu LifeBook P1510D 2.2 pounds 1.2GHz Pentium M (800) WWW-DELL www.dell.com MANUFACTURER/ MODEL Lenovo ThinkPad X41 60GB 1GB RAM 60GB 512MB RAM FEATURES (866) 96-THINK www.lenovo.com Dell Latitude X1 January 1, 2006 8.9-inch wide-SVGA touchscreen, one-year warranty, tablet PC WEIGHT/ PROCESSOR 40GB 512MB RAM STREET PRICE Toshiba Port�g� R200 (877) 789-7158 www.toshibadirect.com $2,099 This story appears in the January 2006 issue of Entrepreneur. Subscribe » 11.1-inch widescreen display, Wi-Fi, Bluetooth, wireless WAN Sony VAIO TX650 3.5 pounds 1.5 GHz Pentium M 60GB 512MB RAM 2.7 pounds 1.2GHz Pentium M (888) 999-4747 www.hp.com Shopping List (877) 865-SONY www.sonystyle.com $2,300 $1,599 Hewlett-Packard Compaq nc4200 12.1-inch WXGA display, CD-ROM, Wi-Fi, Bluetooth, three-year warranty 12.1-inch display, Wi-Fi Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now It seems like everyone’s trying to slim down these days. But you shouldn’t have to work up a sweat when it comes to your mobile computing setup. Hardcore mobile entrepreneurs can take advantage of one of the many ultraportable laptop options on the market.The compromises aren’t as major as they used to be. You still pay a premium to slim down to 4 pounds, but you get plenty of power and features. Hewlett-Packard’s Compaq nc4200 Notebook PC shimmies in at 3.9 pounds and features a 40GB hard drive, 512MB RAM, Wi-Fi and a 1.73GHz Pentium M processor, all for $1,599 (all prices street). You’ll want to add a CD burner or DVD drive.Ultraportables do veer away from the overall trend of increasingly large laptop displays. Expect ultraportables to have diagonal measurements between 8.9 inches and 12.1 inches in varying shapes. Dell’s $1,998 Latitude X1 makes the most of 12.1 inches with a WXGA aspect ratio (1,280 x 768) that improves multimedia or DVD viewing.The Fujitsu LifeBook P1510D takes a slightly different approach, befitting its role as a convertible tablet PC. Its 8.9-inch wide-SVGA display (1,024 x 600) is more rectangular than square for spreadsheet viewing, and it folds back to create a writing slate. At 2.2 pounds, it’s a featherweight, but you sacrifice having an internal CD or DVD drive. Compare it with the heftier Lenovo ThinkPad X41 Tablet, which weighs in at 3.5 pounds and comes stocked with a 12.1-inch display and an integrated fingerprint reader for security. The tablet option isn’t for everyone, but users who work in warehouse environments or who really like the ability to use the handwriting technology will want to consider it. Some buyers may want to wait a bit for the new, improved version of the tablet PC OS set to debut with Windows Vista sometime this year.The style-conscious Sony VAIO TX series starts at about $2,300 and offers a special feature for highly mobile entrepreneurs who need to be on the net. Integrated wireless WAN works in conjunction with a subscription from Cingular to keep you connected anywhere within Cingular’s service area. Throw in 1GB of memory, up to 7.5 hours of battery life, a 60GB hard drive and a CD-RW/DVD-ROM drive, and you get a fully stocked machine that lives up to its price tag. Compare that to the similarly outfitted Toshiba Port�g� R200, which comes with Wi-Fi, 512MB RAM and a slightly larger 12.1-inch screen for $1,999.The try-before-you-buy approach can be especially important when you’re dealing with ultraportables. Their compact size may put a squeeze on some users’ fingers, so find one that’s comfortable. When it comes to battery life, you’re apt to get between three and seven hours with a standard battery. Extended batteries or additional batteries are a must for entrepreneurs who expect to be away from power outlets for long stretches. Ultimately, an ultraportable can be a smart compromise between a hefty standard notebook and the limited capabilities of a PDA. $1,499 HARD DRIVE/ MEMORY 3.9 pounds 1.73GHz Pentium M 12.1-inch display, three-year warranty, fingerprint reader This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Enroll Now for Free
WSCC 3: manage Nirsoft Sysinternals software by Martin Brinkmann on April 18, 2016 in Software – Last Update: May 04, 2016 – 13 commentsWindows System Control Center (WSCC 184.108.40.206) is the latest version of the — free for personal use — program for Windows to download, manage, and update Nirsoft and Sysinternals programs.When it comes to companies or individuals that produce high quality software for Windows, it is likely that Nirsoft and Sysinternals are found on lists people make about that more often than not.Nir Sofer has created more than 200 different applications over the years, and Sysinternals, once independent but now a part of Microsoft, another 70.Programs include all-time favorite applications for Windows such as Autoruns or Process Explorer by Sysinternals, and CurrPort or SearchMyFiles by Nirsoft.If you are a Windows user who is at least a little bit interested in how the system works, you have probably one or more of those programs on your system already.WSCC 3The main idea behind WSCC is to provide a management interface for all Sysinternals and Nirsoft applications.Instead of having to download programs individually from Sysinternals or Nirsoft, it makes them available through the application. Additionally, since all programs are portable by nature, you do get access to these programs on the local system as well without using WSCC, and can even move the programs without losing functionality.WSCC 3 is provided as a portable application or installer. No matter which version you select, it will start with a blank interface on first run that lists no programs.You can hit the install button right away to open the update manager. The program queries both Nirsoft and Sysinternals servers for a list of programs and displays information about each application in list form afterwards.You can download some or all of the programs on that list, and downloads should not take too long considering that most programs are not large.The full archive, with all programs downloaded, has a size of less than 75 Megabyte on the hard drive currently.The update manager highlights the process of each download, and displays the old and new version of the application next to each program added this way. While this is not overly useful on first download, the program is also used to check for updates to update existing programs downloaded previously.This is another major feature of WSCC 3. There is no centralized update option if you download and run Nirsoft or Sysinternals programs individually, but if you use WSCC, update checks are run frequently to make sure you always have the latest version installed.On top of this, the application will also pick up new programs released by either company and add them to the list of available programs as well.Using WSCC 3Programs are listed in details view by default, but you can change that to icons or report view instead. I found the report view to be most suitable as it lists each program on its own line but uses up less space to do so than details view.You run any program with a double-click on its name or line, and may use the built-in search or categorization to display only applications you are interested in.Search is global and will find programs by both companies. On top of that, WSCC 3 will also list built-in Windows system tools.The left sidebar displays an option to list all items in a — very large — listing, browse only Nirsoft or Sysinternals applications, check out the integrated Windows tools, or dive into specific categories such as Security, Process, or System Information instead.You may add tools to the favorites with a right-click and the selection of the appropriate option from the context menu.These items become available under Favorites in the sidebar for fast access.PreferencesAs far as options are concerned, there are quite a few provided. Most options are self-explanatory, but there are some that you may want to check before you run the first download of programs using WSCC 3.You find an option under network to prioritize 64-bit versions of programs if available. While most 32-bit versions of programs should work fine on 64-bit Windows versions, some may not work or may not display all information they usually provide you with.Another option you may find interesting is to add Windows Services to the program under software. This lists all services in the WSCC interface, and provides you with options to quickly start, stop or manage individual services from there.VerdictWindows System Control Center is a useful program for Windows, especially if you run Nirsoft or Sysinternals applications regularly on your system.Apart from offering a centralized interface to run all of the programs directly, its main feature is the ability to update programs and add new releases to the list.The program acts as a launcher for these programs and on top of that, ensures that you don’t miss a new program or program update released by these companies.Summary12345 Author Rating4.5 based on 16 votes Software Name WSCC 3Operating System WindowsSoftware Category UtilitiesLanding Page http://www.kls-soft.com/wscc/downloads.php Advertisement
Protect PDF Documents with PDF Anti-copy by Martin Brinkmann on May 19, 2017 in Software – 8 commentsPDF Anti-copy is a free program for Microsoft Windows devices that enables you to protect PDF documents from being copied.Most PDF creation programs come with options to disable functionality such as printing or copying, or password protect PDF documents to prevent unauthorized access.PDF cracking tools are available that may disable the protection, and PDF Anti-copy promises that its methods prevent the copying after it has processed the PDF document.PDF Anti-copy is available as a portable program, and version that needs to be installed, for all recent versions of Windows. The archive that you download has a size of about 19 Megabytes, the extracted files a size of about 30 Megabytes on the hard drive.PDF Anti-copyThe interface of the program is simple and straightforward. Use the load icon to load a PDF document. The application lists all pages of the document in its interface, and you get a preview of the selected page right away in the interface.You may apply the copy protection to individual pages of the document, or use the check all button at the top to mark all pages instead and speed up the process.The only other option that you have is to change the output directory for the processed PDF file. A click on start now runs the process. The processing takes a while, eve if you select just a couple of pages and not all pages.If you open the processed PDF file afterwards, you will notice that the pages that text from the selected pages cannot be copied anymore, and that document conversions won’t change that either.You wonder probably what PDF Anti-copy does to the file that prevents the copying of content. The answer is simple: it replaces the page with a vector image. This means that the quality does not deteriorate, and that the page looks exactly like it did before.The processing has downsides to it though. First, that it will blow up the size of the PDF document as text is replaced by images. Second, that some functionality is lost. You cannot copy text anymore obviously, but search won’t find anything either.The copy protection is not perfect though. As long as you can read the text on your screen, you could copy it manually, use OCR software to automate the process and edit the output afterwards, or even print the document.The copy protection that PDF Anti-copy adds to PDF pages or entire documents won’t prevent experienced users from copying the contents, but they could block inexperienced ones from doing the same or making it more difficult for them to come up with a solution.Closing WordsPDF Anti-copy is not perfect, but it may prevent some users from copying parts of a document, or at least make it more difficult for them to do so.Summary12345 Author Rating4 based on 5 votes Software Name PDF Anti-copyOperating System WindowsSoftware Category OfficeLanding Page https://pdfanticopy.com/index.html Advertisement
Winamp 5.8 Beta leak appears on the Web by Martin Brinkmann on September 16, 2018 in Music and Video – Last Update: October 19, 2018 – 41 commentsA beta version of the upcoming Winamp 5.8 media player found its way to the darker side of the Web where it is now being distributed heavily.Winamp, which was once a very popular media player for Microsoft Windows devices and is still used by die-hard fans up to this day, has had a rough patch in recent years.AOL, the then-owner of Winamp, announced in 2013 that it would shut down the service and the Internet Radio directory Shoutcast. The company sold Winamp in a turn of events later that year to Radionomy, owners of a platform to create, discover, and listen-to online radio stations.While that meant that Winamp was saved for the moment, it did not really improve the situation otherwise; new Winamp versions were not released and while developers did mention here and there that a new version was in the works, nothing came out of it in the almost 5 years after Radionomy’s acquisition of Winamp.Update: Winamp 5.8 has been released officially. You can check the changelog here and download it there as well.A Winamp developer revealed in 2016 that work was underway on Winamp 5.8 but that the team did not want to release the beta version at the time because it would lack quite a bit of functionality. A forum post on the official Winamp forum listed the changes of the beta version.Neowin reported today that a beta version of Winamp 5.8 leaked on the Web. It appears to the the “real deal” but a version from October 2016. It is certainly not something that you would install on a production machine or on anything really that is outside of a sandbox or virtual environment.Select Help > About Winamp to check the version of the player. There you find listed the version and the release date of the build (which is October 2016).A scan on Virustotal returns three hits out of 62 different engines; likely false positives. The beta version comes with quite a few important changes including the following ones:Winamp 5.8 is fully compatible with Windows 10 and Windows 8.1Minimum required operating system is Windows XP Service Pack 3.All Pro license features have been removed.Replaced proprietary decoders for mp3, aac, H.264 and Mpeg-4 with open source or free to use decoders.DRM support removed.CD ripping and playback uses Winodws API.Windows Audio (WASAPI) support.Shared DLL files are stored in Winamp\Shared.MP3 Encoder must be downloaded manually.Added an option to disable video support completely.Closing Words and verdictConsidering that the build is from October 2016, it is clear that development is progressing at a snail-speed pace. Whether Winamp 5.8 Final will ever be released is up for debate; what is clear is that lots of users seem to be interested in Winamp despite it being more dead than alive for a long time.It will be tough for the player to compete with regularly updated audio players such as AIMP, MusicBee, or the classic foobar2000.Now You: Would you switch back to Winamp?SummaryArticle NameWinamp 5.8 Beta leak appears on the WebDescriptionA beta version of the upcoming Winamp 5.8 media player found its way to the darker side of the Web where it is now being distributed heavily.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisement
(Credit: Helmholtz-Zentrum Dresden-Rossendorf e.V.)Someday, physically touching our electronic devices will be as archaic as standing up from the recliner to change the channel. Voice recognition systems and home assistants can turn on lights, pull up podcasts and order paper towels on command. Cameras in video game systems and televisions can do our bidding with a gesture.And to the list of hands-free methods of component control, we can add electronic skin.E-skins have been garnering a lot of attention from software and material engineers over the past few years. Akin to slapping on a Band-Aid, e-skins can track internal health data such as muscle movement, heart rate and brain activity. Some can even track external factors such as ultraviolet light exposure on the body.Denys Makarov and his colleagues at the Helmholtz-Zentrum Dresden-Rossendorf in Germany developed a new e-skin that marries new and old technology to allow people to manipulate virtual objects without touch.Magnetic field sensors, which can be purchased easily, are not novel inventions. According to Makarov, people have been using them for years to monitor angular motion and displacement. But he and his fellow researchers translated this technology into electronic skins that serve as interfaces with electronics.“We’re beginning to realize an electronic skin that’s a flexible and ultrathin device, which can reconstruct spatial position of the body, finger or palm, for example, with respect to the source of the magnetic field,” says Makarov.It is the first e-skin with angle sensors that can translate directional and axial perception. In a recently published study, the e-skin helps users perform an array of virtual tasks. When worn like a wristwatch, test users could type on a remote, virtual keypad without touching the actual pad—the device captured, digitized and translated movements of their finger onto an external screen via a magnet attached to their fingertip.In another demonstration, users placed the e-skin on their palm. When they placed their hand directly above a magnetic field source and rotated their hand, their motion adjusted the intensity of a virtual light source. Adjusting dials without ever touching them could come in…handy…for people who are tackling a dirty job, for example.(Credit: Helmholtz-Zentrum Dresden-Rossendorf e.V.)The crux of the effort in designing the e-skin was aimed at making it durable and functional.“If you want to have it on the skin, obviously you want it resistant to moisture, and sweat. You want to have it temperature stable, and that’s why we were putting a lot of efforts into developing proper encapsulation,” said Makarov. The final product is a small, but sturdy apparatus with a total thickness of 3.5µm at the site of the sensor.The device could have future applications in navigation, robotics, regenerative medicine, sports, gaming as well as virtual and augmented reality interactions. The team hopes to improve the senor’s sensitivity by two to three orders of magnitude. They also aim to calibrate the device to Earth’s magnetic field.The future of controlling things like a Jedi seems to be getting closer every day.Very cool it is.
(L-R) Miho Yamashita, Anri Ishizaki and Fukuoka Mayor Soichiro Takashima. | Photo: YouTube Fukuoka Mayor Soichiro Takashima made the announcement about the good news in February.But now everything is up and running for the partnership oath system which allows same-sex couple to register their relationship at the municipal government.Couples could start registering their relationship from 1 April with many flocking to sign up in the first few days.Mayor Takashima handed the first partnership certificate to Miho Yamashita, 27, and Anri Ishizaki, 33.Ishizaki is a LGBTI advocate at the Fukuoka Rainbow Educational Networks and said having official recognition of their relationship felt great.‘We’ve already spent our lives together as a family but we’re happy because we feel like we received congratulations from society,’ Ishizaki told media. GAYSTARNEWS- Share this:TwitterFacebookLike this:Like Loading… eTN Chatroom for Readers (join us) Japan recognizing same-sex couplesThe certificate does not give same-sex couples the same rights as married couples under civil. But it will give them the same rights as traditionally married couples in instances such as applying for public housing.Fukuoka is only the second government designated city after Sapporo to recognize same-sex couples.Other wards to recognize same-sex relationships are the Shibuya and Setagaya wards in Tokyo. The city of Takarazuka in Hyogo prefecture started issuing certificates to same-sex couples in June last year.Got a news tip? Want to share your story? Email us . Same-sex couples can now register their relationship in Fukuoka, one of Japan’s biggest cities. One of Japan’s biggest cities will officially recognize same-sex couplesJapanese gay man stopped from going to partner’s cremation will sueJapan’s city of Chiba to issue LGBTI partnership certificatesRead the full article on Gaystarnews: :https://www.gaystarnews.com/article/sex-couples-officially-recognized-one-japans-big-cities/