TECHZIE.BLOGSPOT.COM

Your TECH GADGET GURU


A sign that reads 'THIS RIDE MAY KILL YOU' looms in the background as the Madagascar Institute demonstrates its 'Jet Ponies' ride at World Maker Faire.

(Credit: Caroline McCarthy/CNET)

QUEENS, N.Y.--Under the shadow of the Cold War-era Titan II and Atlas rockets set up outside the New York Hall of Science, this weekend's World Maker Faire extravaganza was, more than anything, a tribute to the more colorful fringes of hands-on innovation, science, and engineering. And the "makers" who populated its tents and booths wanted nothing more than to get the thousands of children in attendance interested in physics, engineering, biology, and even metalwork.

The kids were enthralled. This was not the kind of science you saw in a textbook: there were exploding chemistry experiments, flame-throwing robots, model rockets, lessons in laser cutting and soldering, and a perpetual whir and hum of jet engines that made one man comment, "Sounds like a large vuvuzela." Parked in the middle of the outdoor exhibits was the BioBus, a repurposed school bus that's now loaded with microscopes so that kids can learn about cell biology, including a tissue sample donated by comic television pundit Stephen Colbert.

Even the most offbeat exhibits, staffed by costumed hipsters and artists whose look was far more Burning Man than Bunsen burner, played up the importance of science education. "Can I get a big shout-out for math?" artist Mark Perez asked to a crowd of hundreds of eager children and parents who were about to watch him orchestrate the Life Size Mousetrap, a 50,000-pound feat of mechanics that took Perez a decade and a half to build and which spent the weekend using a two-ton safe to smash a taxi.


John Jay College of Criminal Justice set up a 'CSI'-worthy fake bloody crime scene at Maker Faire to get kids interested in forensics.

(Credit: Caroline McCarthy/CNET)


Explaining the machinery and workings of the Life Size Mousetrap, Perez gleefully played up the fact that many components were extremely heavy, unstable, or potentially dangerous. "This, folks is why I can't get insurance!" he proclaimed.

With all the outcries from Silicon Valley titans that U.S. schools aren't producing the engineers and scientists at the rate that the technology industry needs, a let's-get-rowdy science festival like the Maker Faire brings up an interesting, and potentially controversial point. Maybe science education needs a lot more of the stuff that could send squeamish parents running for the hills. Perhaps the ranks of young future scientists are being thinned by the filter of a world in which the nightly news convinces us to believe that kids are at risk from everything from walking into the backyard unsupervised to logging onto their instant-messaging clients, and in which a combination of budget cuts and safety concerns means that chemistry and physics equations often never get the chance to jump off the textbook page.


Just earlier this month, a coalition of tech CEOs joined the Obama administration in launching Change The Equation, founded by the likes of ex-Intel Chairman Craig Barrett and Xerox CEO Ursula Burns among other chief executives, and backed by the Bill and Melinda Gates Foundation. Last week, Facebook CEO Mark Zuckerberg announced a $100 million donation to the public school system in troubled Newark, N.J., thatmarked the launch of his own education-focused initiative, Startup: Education.


With all this education reform talk, supporters might want to keep in mind the likes of Maker Faire and the expressions on children's faces as they saw the Mentos & Diet Coke experiments and ArcAttack's Tesla-coil music in real life. Maybe science education needs to be more like the stuff of the YouTube videos that kids are posting on one another's Facebook profiles and zapping over Instant Messenger, from pop band OK Go's music-video odes to wacky physics to the craziest moments from MythBusters. In the process, it might have to be a little edgier.

Some educators seem to be clued in. One of the more "serious" setups came from Manhattan-based John Jay College of Criminal Justice, which had constructed a sort of pop-up education center for kids to learn about forensic science and crime scene analysis. This involved a fake crime scene with a pair of bloody corpses, displays about blood-spatter analysis, and T-shirts with bullet holes to explain differences in varieties of firearms.


The more irreverent exhibits were in-your-face risky. An artists' collective in Brooklyn, the Madagascar Institute, had set up a pasture of intentionally terrifying carnival rides with names like "The 360-Degree Swing Of Death" and hand-painted signs that reminded visitors "Safety Third!" "This Ride May Kill You," and "Fear Is Never Boring."


The Madagascar Institute, of course, is purposely pushing it. But if Maker Faire is any indication, science for kids doesn't have to be boring, either.



The Federal Communications Commission has, as expected, released unlicensed spectrum, hoping it will boost the market for wireless internet.




The unanimous decision to sell off the so-called 'white space' should see the widespread introduction of Super Wifi, already being trialled across the country. It is the first significant block of spectrum to be sold off in 20 years, and the FCC says it could generate as much as $7 billion in economic value each year.

"We know from experience that unlicensed spectrum can trigger unexpected but hugely beneficial innovation. For example, years ago, there was a band of low-quality spectrum that was lying fallow. Nobody could figure out what to do with this so-called 'junk band', so the FCC decided to free it up as unlicensed spectrum," said FCC chairman Julius Genachowski.

"The result was a wave of new technologies – baby monitors, cordless phones, and eventually a real game changer: Wifi. Today, Wifi is a multi-billion industry and an essential part of the mobile ecosystem."

The move was opposed by police and firefighters, who wanted the frequencies reserved for emergency services and broadcasters concerned about interference.

AT&T and Verizon were also unhappy about the proposal - because the spectrum would likely be reserved for smaller carriers, they'd miss out at the trough.
In its decision, the FCC has aimed to appease some of these concerns by ordering that devices will have to be designed in such a way that they don't interfere with broadcast channels or wireless microphones.

Commenting on yesterday's ruling, vice president of communications for the National Association of Broadcasters Dennis Wharton said the NAB was still reviewing the details.

"NAB's overriding goal in this proceeding has been to ensure America's continued interference-free access to high quality news, entertainment and sports provided by free and local television stations," he said.

Sony might have blocked the loophole which allowed its PlayStation 3 games console to get jailbroken, but hackers have found a new way to jailbreak the electronics giant's device.

A hacker, Hasuky, uploaded the jailbreak details on a Spanish forum, Elotrolado to enable users of PlayStation 3 break in to their gaming console.

According to tech news site Geek, Hasuky used a Sixaxis controller, an official component of the PS3 device, to integrate a PS Groove USB modchip into the device in order to jailbreak the PS3 games console.


As soon as modchip is soldered with the Sixaxis, the users can easily defy all restrictions on the console and can run the jail broken device easily. However, the modchip integration is not suitable for users who are not technically competent.

The move will also void the warranty of the console and may also affect the controller.



Google has uploaded a new cake shaped doodle on its search engine home page to celebrate its 12th anniversary today.

The Mountain View, California-based internet search giant has taken special permission from the Visual Artists and Gallery Association (VAGA) of New York to upload a classic painting by Wayne Thiebaud as its logo, tech news site Erictric has revealed.


Thiebaud is an emminent 89 year old painter, based in Los Angeles, California and is famous for his association with the Pop Art movement of America.

The painter is known for his pictures of cakes, pastries, toys, lipsticks and other things signifying the Pop Art culture.

Although the company remains doubtful about the date when it was established, 7 September is known to be its birthday. The company went on to decide 27 September as an official anniversary date after celebrating it on the seventh of the same month for a few years.



The next edition of the iPad could have a lot in common with Samsung's Galaxy Tab. GigaOM reports that analyst Ashok Kumar has stated that Apple might be working on a new 7" version of the iPad for launch in 2011. This slate will pack both front and rear-facing cameras.

Let's put on our thinking caps for a moment here. We know that a new iPad is coming out next year. Apple hasn't announced it, but we have the iPhone's upgrade schedule to use as a guide. The industry is moving too fast for Cupertino to sit on their laurels for a full year. The front-and-rear facing cameras are definitely likely, possibly even "all but" guaranteed.

So now we're down to that 7" form-factor. Apple might want to go with a smaller screen in order to reduce the iPad's weight and make holding it one-handed for extended periods of time easier. Or they might be trying to cut on costs more. Personally, I doubt any 7" iPads will be released solo. Apple may increase the line to include 7" and 10" models, though.

Twitter was hit by another malicious attack which led to an obscene message automatically being posted from an affected user's Twitter account.

The micro blogging platform has responded by disabling the offending link and is said to be quickly resolving the issue which allowed the worm to spread on the platform.




Users found that their account was posting a message that declared their love for goats, after they clicked on a link which read, 'WTF: '.

When users clicked on the link, they were redirected to a website which used CSRF (cross-site request forgery) technique to fool Twitter into posting the message.

Security firm Sophos explained via blog post: “All the user sees if they visit the link is a blank page, but behind the scenes it has sent messages to Twitter to post from your account. The messages obviously couldn't be sent if you weren't logged into Twitter at the time you clicked on the link.”

One of the more well known Twitter user was celebrity blogger Robert Scoble, who immediately warned his followers about the malicious link when he discovered it.





The Obama administration is drafting legislation to expand wiretap authority to intercept all Facebook, BlackBerry and Skype communications.

The Obama administration is working on a proposal that would make it easier for law enforcement and security officials to eavesdrop on online chatter, including e-mail, instant messaging and social networks, reported The New York Times on Sept. 27.

The proposed legislation will likely come before Congress next year.

The White House-sponsored bill would require all Internet-based communication services to be technically capable of complying with a federal wiretap order. This includes being able to intercept and unscramble encrypted messages, said the Times.

It will give the government the ability to listen in on literally every communication anyone makes online.

While the officials working on the proposal do not yet agree on how to define what constitutes a communications service provider, encrypted e-mail transmitters like the BlackBerry, social networking sites like Facebook and peer-to-peer messaging software like Skype will likely be included. The Obama administration prefers the broadest definition, which would include companies whose servers are operated outside of the United States, such as Canadian-based Research In Motion, maker of BlackBerry smartphones.

"We're not talking expanding authority," Federal Bureau of Investigation General Counsel Valerie Caproni told the Times. "We're talking about preserving our ability to execute our existing authority in order to protect the public safety and national security."

Federal law enforcement and national security officials have been demanding more control over Internet wiretapping, arguing that extremists and criminals are more likely to chat online than using telephones.

The proposal raises serious privacy concerns about users on the Internet, reminiscent of the uproar that followed Bush administration's expansion of thegovernment's wiretapping authority. It could also set an example for other companies to follow, the Times said.

"They basically want to turn back the clock and make Internet services function the way that the telephone system used to function," Vice President of the Center for Democracy and Technology James X Dempsey told the Times.

RIM has been dealing with this issue over the past few months. Several countries, including India and Saudi Arabia, threatened to ban BlackBerry services, claiming the device's e-mail encryption posed a national security risk. RIM agreed to give security officials "lawful access" to data; United States officials would like similar access under the proposed law.

Internet and phone networks are already required to have eavesdropping abilities thanks to a 1994 law called the Communications Assistance to Law Enforcement Act. While extending the wiretap authority to include digital networks and cell phones, and not just copper-wire phone systems, the law does not apply to communications service providers.

Under the current rules, investigators can intercept messages at the network company's switch. If the user is using a service that encrypts the messages between the computer and the servers, investigators have to go to the communications service provider to view the unscrambled content. While some service providers have the capability to intercept these messages, most do not. According to the Times report, many providers wait until they are served with wiretap orders before developing intercept capabilities.

However, some services, like peer-to-peer instant messaging software, encrypt messages between users, so even the provider cannot unscramble them. The proposed legislation will require these programs to be redesigned so that they can be unscrambled.

"They can promise strong encryption. They just need to figure out how they can provide us plain text," said Caproni.

According to the report, officials from the White House, Justice Department, National Security Agency, FBI and other agencies have been working on the proposals, but important elements still have to be worked out.


Iran admits Stuxnet worm infected PCs at nuclear reactor

But denies that 'groundbreaking' malware infiltrated control systems or caused major damage





Computerworld - Although some computers at Iran's Bushehr nuclear reactor were infected by the Stuxnet worm, none of the facility's crucial control systems were affected, Iranian officials claimed Sunday.

The news followed Saturday's admission by Iran that Stuxnet had infected at least 30,000 computers in the country. The worm, which researchers have dubbed the most sophisticated malware ever, targets Windows PCs that manage large-scale industrial-control systems in manufacturing and utility companies.

Those control systems, called SCADA, for "supervisory control and data acquisition," manage and monitor machinery in power plants, factories, pipelines and military installations.

"The studies show that few PCs of Bushehr nuclear power plant workers are infected with the virus," Mahmoud Jafari, the facility's project manager, told Iran's state-run Islamic Republic News Agency on Sunday.

Jafari denied that the worm had caused major damage to SCADA systems or that Stuxnet had delayed the reactor's completion.

Bushehr is slated to go online in the next few months. In late August, workers began loading the reactor with nuclear fuel.

Stuxnet has attracted as much attention for its presumed target as for its technical expertise. Shortly after a Belarus antivirus firm reported finding the worm, U.S.-based security company Symantec noted that Iran was hit hardest, with approximately 60% of all infections traced to that country's computers.

Since then, experts have amassed evidence that Stuxnet has been attacking industrial control systems since at least January 2010, while others have speculated that the worm was developed by a state-sponsored team of programmers and was designed to cripple the Bushehr reactor.

The reactor, located in southwestern Iran near the Persian Gulf, has been one of the flash points of tension between Iran and the West, including the U.S., which believes that spent fuel from the reactor could be reprocessed elsewhere in the country to produce weapons-grade plutonium for use in nuclear warheads.

Liam O Murchu, manager of operations on Symantec's security response team, and one of the researchers who has been analyzing Stuxnet since it popped into public view, said there was not enough evidence to conclude that the worm was aimed at Bushehr.

"I've also seen reports [from Iranian officials] that the Bushehr reactor doesn't use Siemens software," said O Murchu, referring to the German electronics giant's control program that Stuxnet specifically targets. "So if it doesn't use Siemens software, the Windows machines may have been infected but not the SCADA software."

At the same time, O Murchu said that in plants that do use Siemens SCADA software, the likelihood of Stuxnet spreading from an infected Windows computer to the facility's industrial control systems was "quite high."

"Stuxnet can spread using several vectors," O Murchu said. "It's quite likely that it would be able to crawl the network and infect the Siemens software."

Later Sunday a different Iranian official also denied that Stuxnet had caused any problems at Bushehr. About four hours after quoting Jafari, the Islamic Republic News Agency published another story, citing Asghar Zarean, deputy head of Iran's Atomic Energy Organization in charge of safety and security, who reiterated that Stuxnet had not impacted the plant's control systems.

Zarean claimed that "no penetration by the virus had been observed" in the agency's nuclear facilities. He also said that precautions had been taken to stymie Stuxnet from further infection.

Stuxnet, called "groundbreaking" by another researcher actively analyzing the worm, used multiple unpatched, or "zero-day," vulnerabilities in Windows; relied on stolen digital certificates to disguise the malware; hid its code by using a rootkit; and reprogrammed PLC (programmable logic control) software to give new instructions to machinery that software managed.

Microsoft has patched two of the four vulnerabilities exploited by Stuxnet and has promised to fix the remaining flaws at some unspecified future date.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at Twitter @gkeizer or subscribe to Gregg's RSS feed Keizer RSS. His e-mail address isgkeizer@computerworld.com.


Quantum computing is one step closer to reality, thanks to work done by a team of international scientists at the University of Bristol... Jeremy O’Brien however, certainly has an impressive designation as the Director of the Centre of Quantum Photonics in the United Kingdom, and he has a very interesting announcement to make: “We can say with real confidence that, using our new technique, a quantum computer could, within five years, be performing calculations that are outside the capabilities of conventional computers."

So, what exactly has the team of international researchers at the University of Bristol done? They have designed a photonic chip that works with photons, rather than the electrons that are used in conventional processors. The chip currently has “several [working] models”, and will apparently work by sending entangled photons down pathways/networks in a silicon chip. Together, the entangled photons will perform a “coordinated quantum walk”, and the outcome of this process will represent the “results of a calculation.”


Also called an optical chip, the photonic chip’s network of optical circuits allows for a quantum walk to occur with two photons and be detected, which is the underlying basis for the entire discovery. Previously, scientists had achieved a quantum walk with single photons, but with two photons, they were challenged by the requirement of ensuring that the two photons are exactly identical, and then take into account their particle-particle interaction within the circuit. Now that they have done it, the possibilities really open up, and, according to the same scientists, going from two to many photons will not be very hard, as the same principles apply. Each time you increase the number of photons, the number of possible outcomes increases exponentially, allowing scientists to simulate extremely complex situations and models. So, for now, the next goal is performing multi-photon walks.

The concept of the quantum walk comes from the mathematical concept of the random walk, which can be defined as the “trajectory of an object taking successive steps in a random direction”, whether in two or multi-dimensional space. A random walk takes special meaning when dealing with quantum particles, as randomness here is inherent at every step. With the trajectory provided by the coordinated quantum walks of two entangled photons, scientists have been able to perform a new kind of computation with newly developed algorithms, which will perform orders of magnitude faster than today’s processors.

Check out how small the photonic chip is, placed next to a UK penny.

Mr. O’Brien added that the software that could run on such a processor architecture had yet to be developed, and input-output devices would have to re-developed as well. The first real-world applications you can hope to see will be in the world of science, where simulations relying on the assimilation of millions of variables are required. All this is possible because of the inherent uncertain nature of quantum physics, which can allows for a single subatomic particle to be in several places at simultaneously: “unlike an electronic 'bit' in conventional computing, the use of quantum particles, or 'qubits,' permits parallel computing on a scale that would not be possible with conventional electronics.”

Image courtesy: Gizmag ; source : Digit





Sorry for the inconvenience !....


Iam presently busy with my studies so i cannot maintain this for some days
will be back soon

-Tech Guru

Place an Ad