Search

   

Saturday 19 November 2011

Hypersonic bomb: One-hour delivery?


That is the title of the article which you can find at cnet.com. It mentioned that the U.S. Army has successfully tested a hypersonic aircraft that can travel five times the speed of sound and reach anywhere on Earth in less than an hour.

Described by the Pentagon as a 'glide vehicle, designed to fly within the earth's atmosphere at hypersonic speed and long range.

The weapon is part of Conventional Prompt Global Strike (CPGS), a program that would give the U.S. the power to strike anywhere in the world with conventional weapons.

Demand and supply?

What is Demand? and What is Supply?

The following is the description from investopedia.com on demand and supply.

Supply and demand is perhaps one of the most fundamental concepts of economics and it is the backbone of a market economy. 


Demand refers to how much (quantity) of a product or service is desired by buyers. The quantity demanded is the amount of a product people are willing to buy at a certain price; the relationship between price and quantity demanded is known as the demand relationship. Supply represents how much the market can offer. The quantity supplied refers to the amount of a certain good producers are willing to supply when receiving a certain price. The correlation between price and how much of a good or service is supplied to the market is known as the supply relationship. Price, therefore, is a reflection of supply and demand.


Law of Demand:
Law of Supply:

Equilibrium:


Disequilibrium: Excess supply


Disequilibrium: Excess Demand


Read more: http://www.investopedia.com/university/economics/economics3.asp#axzz1eABLC82m

Friday 18 November 2011

Eurozone debt web: Who owes what to whom?

Europe is struggling to find a way out of the eurozone crisis amid mounting debts, stalling growth and widespread market jitters. After Greece, Ireland, and Portugal were forced to seek bail-outs, Italy - approaching an unaffordable cost of borrowing - has been the latest focus of concern.

But, with global financial systems so interconnected, this is not just a eurozone problem and the repercussions extend beyond its borders.

While lending between nations presents little problem during boom years, when a country can no longer handle its debts, those overseas banks and financial institutions that lent it money are exposed to losses. This could not only unsettle the home country of those banks, but could, in turn, spread the troubles across the world.

So, in the tangled web of inter-country lending, who owes what to whom? Click on a country in the circle to find out what they owe to banks in other countries, as well to find out their total foreign debt, including that owed by governments, monetary authorities, banks and companies.

The circle below shows the gross external, or foreign, debt of some of the main players in the eurozone as well as other big world economies. The arrows show how much money is owed by each country to banks in other nations. The arrows point from the debtor to the creditor and are proportional to the money owed as of the end of June 2011. The colours attributed to countries are a rough guide to how much trouble each economy is in.











More details from the source at http://www.bbc.co.uk/news/business-15748696

Wednesday 16 November 2011

Stanford's latest iPhone and iPad apps course now free to the world on iTunes U

BY SARAH JANE KELLER
Students may covet seats in Stanford's popular iPhone and iPad application development course, but you don't need to be in the classroom to take the course.

Anyone with app dreams can follow along online.

Paul Hegarty teaches students how to program applications for iPads and iPhones in a free online course that's the most popular download on Stanford's iTunes U site, with more than 10 million views.
Stanford has just released the iOS 5 incarnation of iPhone Application Development on iTunes U, where the public can download course lectures and slides for free. Some of the most talked-about features of Apple's latest operating system include iCloud, streamlined notifications and wireless syncing.
When Stanford's first iPhone apps course appeared online in 2009, it made iTunes history by rocketing to a million downloads in just seven weeks.
Alberto Martín is an engineer and independent iOS developer in Salamanca, Spain. He has been a diligent student of the online app development class since it first appeared.
He has created applications, now for sale in Apple's App Store, that organize your photos and make navigating while driving less distracting. Or, for fitness fans, an app that counts your pushups.
His apps provide him with extra income. "I hope some day I can live off this, because I love doing it," he said.
"Although it's not impossible, I think it's hard to make a lot of money in the App Store," Martín said. "But I think it's a beautiful process because it gives you the opportunity to develop your own ideas, sell them and fight for them."
Martín has been eagerly awaiting the release of the new course and says that he will follow the classes for as long as they keep coming.
"You learn a lot by watching the lectures on iTunes U," he said. "If you want to have success you need to keep on learning new things."
L.A. CiceroStudents check the results of their coding on their iPhones in the Developing Apps for iOS taught by Paul Hegarty
Students check the results of their coding on their iPhones in the Developing Apps for iOS taught by Paul Hegarty
Online learners hear the same lectures as classroom students, but do not get Stanford credit or access to instructors.
Instructor Paul Hegarty attributes the course popularity to the appeal of Apple products and the instant gratification of creating apps for mobile devices. "There's something about developing for the iOS platform that's really exciting and fun because it runs on devices that everybody has in their purses or pockets, " he said.
"There aren't a lot of courses you can take that when you get to the end, to your final project, you can take it out of your pocket and show your friends."
Hegarty said that his students develop a wide array of applications for the iPhone and iPad, including many that improve or automate their daily lives. Those include apps that manage laboratory experiments, keep track of food choices at campus eateries, or access the works of Shakespeare. Games and social networking applications are also popular.
John Cast, an electrical engineering student who is taking the class in a Stanford classroom, said that he learned about the course by watching earlier versions on iTunes U. Cast is working on applications that archive historical memorabilia and improve FM radio tuning.
"One of the coolest things about teaching this class is just seeing the creativity that gets applied," Hegarty said. "It's really quite amazing."
Developers unfamiliar with Apple's operating systems must learn a new programming language, Objective-C, if they hope to master the apps course. Stanford students take a year of computer science classes and learn the technique of object-oriented programming before tackling the iOS development class.
Two Stanford prerequisite courses, Programming Methodology and Programming Abstractions, are available on iTunes U.
Nikil Viswanathan, a computer science student, said that the class is "really, really, good" in large part because Hegarty doesn't just teach students a new language, he teaches the "philosophy of how we program in Objective-C" and "puts it into the context of entire computer science program."
Most introductory computer science classes are abstract, but Objective-C is used to build applications for mobile devices, so students learn the programming basics and apply them right away. "I don't think that what I'm doing is just teaching them programming," Hegarty said. "It's an opportunity to teach them some computing fundamentals in a real world environment."
Hegarty said he enjoys that so many people benefit from the work he puts into preparing the course. "You really feel like as an instructor that the work gets leveraged," he said. "It's really rewarding."
Sarah Jane Keller is a science-writing intern at the Stanford News Service
Media Contact
Dan Stober, Stanford News Service: (650) 721-6965, dstober@stanford.edu

How Thieves steal your credit card data



Suspect 1: The Waitress At Your Local Cafe


Mode Of Operation:
When it's time to pay the waitress whisks away your credit card and swipes it through the restaurant's register. Then, she pulls out a small device, about the size of an ice cube, from her apron and swipes it through that.
While you're scraping the last of the chocolate cake from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.

Known Whereabouts:
The data-stealing waitress has been known to moonlight as a bartender, sales assistant or at any place where she can take your credit card out of sight

Suspect 2: The Toy Store Trio


Mode Of Operation:
Sally, Simon and Greg walk into a toy store. Sally and Simon roam the aisles, while Greg waits in line to check out. When Greg is at the register, Simon comes running up to the shop assistant, screaming that his wife has fainted.

As Sally and Simon distract the shop assistant, Greg switches the credit card reader at the register with a modified one of his own.

For the next week, the shop assistant unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.

Known Whereabouts:
The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a duo or a solo criminal.



Suspect 3: The Petrol Prowler


Mode Of Operation:
The Petrol Prowler parks her car in front of a petrol station off the highway. It's late. There's no one around except a sleepy shop assistant at the register inside. The Petrol Prowler attaches a skimmer over the credit card reader at the pump. It's a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan.
The Petrol Prowler pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.

Known Whereabouts:
The Petrol Prowler installs skimmers over ATMs, parking meters, vending machines and any other places with unmanned credit card readers.

Suspect 4: Harry the Hacker and Phishing Phil


Mode Of Operation:
Harry the Hacker installs malware - a type of software that damages or infiltrates a computer or network - onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer.

Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke including passwords to your financial accounts.


What Happens To Your Information?


Mode Of Operation:
So what happens to these pieces of data when they're in no-good hands? They get sold.
The waitress, trio or Petrol Prowler may be able to sell each swipe for $20 to $40 a pop. Harry the Hacker and Phishing Phil could get $5 to $10 a card and often sell the information online at the eBay of credit card activity. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with your account information attached to it. The card maker then sells it to other criminals who buy goods such as stereos or baby formula and sells them to regular consumers.


Identity Theft: How To Avoid It

1. Set up mobile alerts for your phone if your financial institution provides the feature. That way, you can be aware of unusual activity as quickly as possible.

2. Regularly monitor your accounts online, so you can identify fraudulent transactions faster.

3. Avoid public computers. Don't log onto your email if your bank corresponds with you there. One idea is to set up an email account just for your finances and then only check it from safe locations.

4. Avoid doing business with unfamiliar online vendors. Stick to established merchants and websites.

5. If your information has been compromised, notify your financial institutions immediately and also inform the police what has happened.

For More Information On How To Avoid Identity Theft Visit: