Saturday, January 22, 2011

Cleaning "Green"

Toxicity. Do we really know what this means? Can you even say it ten times really fast? What ever it is we know it has become a way of life.

It is a fact that we are exposed daily to an incredible array of toxins in our normal lives. They are "toxins" and each one has a certain degree of toxicity to it. Toxicity can be determined in a variety of ways.

With an interest in a sparkling house you need to know a little bit about it to protect yourself, your family and anyone else whose house you clean.

The next question then becomes how can you respond and what can you do?

Well, you can do a lot as a dedicated house cleaner. First, limit your exposure. Read labels carefully. Use nontoxic cleaning products. Avoid using indoor pesticides.

Secondly, limit the exposure of the people around you. Happily for you and your house there are plenty of effective, earth-safe cleaners that you can buy or make. Borax mixed with lemon juice will take out toilet-bowl stains. White vinegar is useful for disinfecting bathrooms and kitchens. Bon Ami, a borax-based powder cleanser sold in supermarkets and hardware stores for more than 50 years, safely cleans pots, pans, sinks, oven interiors along with other corroded surfaces.

Using these alternatives will reduce the toxic load in your house and beyond. Using environmentally friendly cleaners will also safeguard your health and that of the community. It reduces air, water and ground pollution in the big picture.

So why isn't everyone doing it? The reality is, few people actually check labels. Start now. Take time to read the lable. Distinguish yourself as a "green cleaner." You can start a trend. You can actually become a product toxicity home specialist.

The first thing to know is that not all "green" products are created equal. Again, read. Catch the ones that have been prettied up with essential oils. Check labels for irritating chemicals such as chlorine, ammonia and artificial fragrances and dyes.

Many people who "think green" are just now applying their philosophy to the dirt at hand. "Eco-friendly cleaning and laundry products are the next frontier of environmentalism," says Marci Zaroff, former publisher of Macrocosm and CEO of Under the Canopy, an organic-fabric clothing company. "It's an inexpensive, easy and effective way to protect our planet and commitment to life." About The Author: Joy Jackson writes extensively on House Cleaning Tips so you can clean faster and clean better.

Cryptography

The recent explosive growth of PC’s and Internet-based commerce has significantly increased the need for a wide variety of computer security mechanisms. This article, the second of a three-part series, lays the underlying foundation in plain language.

A slightly longer series of articles "Keeping Your Secrets Secret" will examine practical examples in greater detail and provides useful tips and advice. Of course, these will continue with the theme of making crypto and computer security easily understood.

One-Way Hash

Also known as a one-way function, a message digest, a fingerprint or a checksum, the algorithm creates a fixed-length output that cannot be reversed. One-way hashes provide checksums to validate files, create digital certificates and played a central part in many authentication schemes.

Let us consider this example. For ages, the Chinese have a fortune-telling method that relies on "Ba Ji" (eight characters) which uses the time, day, month and year of birth according to their calendar. There are sixty possibilities (almost equal to 6 bits) for each of the four variables. Since the Chinese use two characters for each variable, the result is always eight characters. This is an example of a nonsecure 24-bit one-way hash.

Obviously, this way of producing a one-way hash is not acceptable for security purposes because of the huge number of collisions (different inputs producing the same output).

The most commonly used hashes are SHA-1 (Secure Hash Algorithm uses 160 bits) and MD5 (Message Digest uses 128 bits). In August 2005, a team of cryptographers led by Xiaoyun Wang of Shandong University, China, presented a paper that found faster ways of finding collisions than the usual brute force method. These exploits (vulnerabilities) may make digital certificates forgery a reality.

The implications to e-commerce may be widespread not to mention the millions of websites which used MD5 to hash the users’ passwords in their databases. Any webmaster can tell you that converting these sites to use SHA-256 or SHA-512 will not be a trivial task.

In a recent directive, NIST (National Institute of Standards & Technology, U.S.A.) has advised U.S. governmental agencies to use SHA-256 or SHA-512 (256 and 512 bits respectively) instead.

Biometrics

A biometric device is one that can identify unique characteristics from a finger, eye or voice. Many believe that biometrics should provide a higher level of security than other forms of authentication.

There is a news story in March 2005 of how a Malaysian owner lost his Mercedes car and index finger to car thieves armed with machetes. Obviously the keyless ignition electronics cannot detect whether the finger is still part of the original body nor whether the finger (and by extension the person) is alive or not.

Recent security breaches have heightened concern over depositories of personal information stored on many financial sites. When such breaches occurred, the incidence of identity thefts will thus rise also.

If you lose your credit card, you can always void the card and get a new one. When you lose your fingerprint (stored digitally), or other biometric features, who can replace those?

Passwords

When asked to conjure a random number or characters, most people inevitably used materials that are familiar to them like birthdays, names of family members, pets’ names and so forth.

For example, most will choose dates when asked to choose a six-digit number for their ATM Personal Identification Number (PIN). Doing so will reduce the number of possibilities by nine times.

Random Numbers and Generators

Random numbers are central to crypto. To qualify as true random numbers, the output from random number generators (RNG) must pass statistical tests of randomness. Two suites considered as de facto standards are the "diehard" suite developed by Prof. George Marsaglia of State University of Florida and "Statistical Test Suite" from NIST.

Second, the RNG’s output must be unpredictable even with complete knowledge of the algorithm or hardware producing the series and all the previous bits produced.

Third, the RNG’s output cannot be cloned in a repeat run even with the same input.

The most common approach to producing random numbers is by using an algorithm carried out by a computer program (Yarrow, Tiny, Egads, Mersenne Twister). Such algorithms cannot produce random numbers, hence their names, pseudo-random number generators (PRNG).

Another approach is to use physical events such as entropy produced by the keyboard, mouse, interrupts, white noise from microphones or speakers and disk drive behavior as the seed (initial value).

Some may argue that true random generators are those that can detect quantum behavior in subatomic physics. This is because randomness is inherent in the behavior of subatomic particles - remember the electron cloud from your high school physics.

One-time Pad

The most effective system is often the simplest. A one-time pad (OTP) is a series of random bits that has the same length as the digital object to be encrypted. To encrypt, just use a simple computer operation, exclusive OR (XOR). To decrypt, simply XOR the encrypted result with the same random bits.

The downside of using OTP is that once used, it must be discarded. Second, the OTP and the digital object must have the same number of bits. Lastly, the obvious problem of synchronizing the OTP between the receiver and sender.

Internet Protocol

With VOIP technology, you can now place a phone call to someone on the other side of the world using your broadband internet connection rather than a telephone. VOIP technology, in essence, takes the analog signals from your voice and converts them into digital signals able to travel over the internet. Then, at the other end, VOIP converts the digital signal back to the spoken word. Types of VOIP service vary.



Some VOIP providers only allow you to call other users of the same VOIP provider; other VOIP providers allow you to call anyone with a telephone. To break it down, there are three basic types of VOIP service: With an ATA (an analog voice adaptor), which is box that connects your computer (or your internet connection) to your telephone for VOIP use. With an IP phone, a special VOIP phone that is by all appearances a regular telephone but with special Ethernet connectors allowing you to hook it up to your router. Before long, WIFI VOIP phones will be on the market, allowing you to place a VOIP call from any internet hot-spot.With just your computer, you can install VOIP software and place, for free sometimes, VOIP phone calls anywhere in the world.



Get a sound card, speakers, a microphone, and an internet connection, preferably broadband, and youÕre good to go. Probably one of the most apparent benefits of VOIP is how it relieves you of the need to pay the telephone company for phone service. That's one more bill out of your life! You only need to pay your broadband bill (plus VOIP charges) to have your telephoning needs met as well, and a VOIP bill is usually much cheaper than a phone bill. If you carry an internet-enabled laptop with you wherever you go, say, on a vacation, then all you need to do is bring your VOIP adapter and/or IP telephone and you've got service as good as, if not sometimes better than, a cell phone.You must also consider the disadvantages before diving in and going VOIP. For one, your VOIP service may not respond well during power outages and server failures. If your internet is ever out, your VOIP will be out as well, and thus your ability to place phone calls.



Additionally, not all VOIP providers offer 9-1-1 or directory assistance calls. Before purchasing VOIP hardware and service, make sure the VOIP company you choose provides the services you need. Interestingly enough, you may have been placing VOIP calls for a long time now without even knowing it. Telephone companies have been using VOIP technology to make their services more efficient. You can also expect most of the same features from your VOIP service provider as you currently get from your phone company. VOIP service often includes caller ID, call waiting, call transfer, return call, and other convenient features youÕre used to.



Additionally some VOIP providers offer call-filtering services, letting you choose how calls from a designated number are dealt with. Maybe you forward the call to a different number elsewhere, maybe the caller gets a busy signal from you, or a message saying your number is Òno longer in serviceÓ. Some even allow you to check your voicemail over VOIP and add voice messages as email attachments.VOIP is a burgeoning technology with extremely promising possibilities ahead of it. Before long, Ma Bell may become obsolete.

Friday, December 24, 2010

Memory Stick

The Sony Memory Stick Pro Duo is the successor of the two original memory sticks namely the Memory Stick Duo and Pro. This new model has the capability of storing up to 32 GB of data. The Pro Duo succeeds both the original memory sticks in every way by offering not only a bigger storage capacity but also faster transferring speed.

You can use the Pro Duo to download and upload data like images, videos, music, document files to various electronic devices like cameras, cell phones, printers, PDAs, handheld gaming devices like the Sony PSP and other electronic devices. Let's look at some of the specifications that this little but powerful device has to offer.

1. The storage capacities - from 128 MB all the way up to 32 GB.

2. The Pro Duo comes with an adaptor which makes it compatible with a standard SD memory card reader.

3. The device also comes with a Five-Year Warranty.

4. Data Transfer Rate Of 15 - 20 MB/second

5. Convenient size - 0.06 in (width) x 1.22 in (height) x 0.79 in (length).

It also is compatible with all devices that support the Memory Stick Pro. While the capacities of 1 - 2 GB are usually enough for most home users, some users may require more memory capacity. In 2008, Sony released a 16GB version and a larger 32GB version was launched in August 2009, making it the largest capacity available as this time of writing.

The device protects your data from power failure because of its fast transfer rate, it allows you to back up all your important data in an instant.

This small and yet powerful device has created a new concept of exchanging data across different platforms, you can download some music files onto your PC and then transfer them to your Pro Duo using a memory card reader and then transferring the files to your cell phone allowing you to listen to your favorite tracks while on the run.

It's a handy little piece of hardware that one cannot live without these days.

Processing Speed

PC turns out to be an unavoidable instrument and even a friend at the present time. Any mistake your computer experiences can damage the system and be the reason of a lot of problems. Consequently, it is vital for PC users to get knowledge about specific approaches and techniques to diagnose PC problems and increase the performance of your machine so that it is possible to work at your PC properly. Every person likes to use the web especially fast speed internet connection. But if users utilize computer constantly and never take care of its problems and errors they may experience slow computer speed and even a system crash.

So let's diagnose your machine and fix all the errors and improve computer processing speed. Clean the system hard drive entirely from unneeded files. A lot of programs and applications are installed by default on the C hard drive. This space becomes loaded with programs and data that it may lessen your speed. Your system needs space to operate well and offer you high performance. Disc C should be cleaned from unnecessary programs and files. After that the system registry needs to be properly reviewed. You should get the registry cleaner application and run the program. Here it scans unneeded files and removes it entirely. It can fix corrupted registry and delete old roots and dll files from your machine.

Then go to the control panel and turn off all the programs that you don't need in your system start up. In this way the boot of your system will be faster. After that, make a defragmentation of all the disks to increase the high performance and speed access to your files. As a rule, defragmentation influences very positively on your system and it is inevitable feature to increase your computer speed. In this way you will simply improve your computer processing speed.

In the modern world the issue of slow computer can turn into a real problem. So, if any of your activities are closely connected with computers, be sure to check if you are not facing the slow PC problem otherwise it can lead to some or even significant damage.

Ergonomic Mouse

Consistent computer users should take a moment to think about their health in the future. Body parts such as hands, eyes, neck, back, and legs could suffer bad effects of poor posture. So, if you have a workplace, consider providing ergonomic computer parts, seats and workbenches. An ergonomic mouse pad is one of those accessories you should order right away. When you rest your wrist on a pad, you can prevent diseases like carpal tunnel syndrome. It reduces pressure on the wrist tendons and ligaments.

There are many types of mice pads available today. If you want to choose one, the following tips could help. First, concentrate on picking a cushion that could enable a comfortable hand position. Most pads imitate this natural position, which falls at a given angle. You will find that most of them have a raised section, meant for reducing injuries occurring due to long term use of a mouse and keyboard. As a result, you have to ensure that the device conforms to the wrist.

This will give you optimum support. Numerous designs come with a wrist rest attached to the ergonomic mouse pad. Additionally, a few of them attach to a sticky base for providing support. This part eliminates any slipping tendencies by providing enough stability. Next, make sure that this part is made of soft material. Commonly, most of them feature gel material, which is soft and comfortable. Thus, it exerts less pressure on the tendons and nerves in the forearm or wrist.

The harder the material is, the more pressure it is likely exert. That's why many people complain of sore joints and discomfort. Pay more attention to the angling of the wrist rest pad. This means that your palm should rest on top of the padding and the wrist should not. In addition, the palm should move easily and conveniently without any discomfort. If there is any, the wrist wadding should allow for easy adjusting.

Another imperative detail you have to know is that ergonomic mouse pad products have different sizes.
Measuring from front to back, a good style should be no less than one-point-five inches deep. Make sure that the item has enough breadth so that it can host your palm properly. If you truly care about your future, buy this cushion. It will assure good health of your ribs now and in the future. If you pick the best, you will be happy with the functionality of yours mouse. When you place them on a perfect tracking surface, such as padding, all mice offer high scrolling performance.

To get familiar with these items, you need to view their images online. They come in many different colors, shapes and sizes. Consequently, you can even find a small size item for a child who uses a computer, and a big one for yourself. It is a good thing that they cost as low as ten dollars or even below. You can buy more that one item as long as they will fulfill your needs. Color choice of an ergonomic mouse pad is the simplest thing you could do, of course.

Saturday, November 27, 2010

FPGA Technology



As aerospace and defense contractors pursue higher levels of system performance while addressing the realities of budget constraints, system engineers have turned to Field Programmable Gate Array (FPGA) solutions as a way to create a new generation of increasingly complex electronics systems.

Advanced FPGA technology makes it possible to replace multiple Application-Specific Integrated Circuits (ASICs) or Application-Specific Standard Product (ASSPs) with a single programmable device that is tailored to a specific end-user application. Telemetry systems, deployed on government test ranges or on board military aircraft, are a prime example.

Telemetry System Requirements:
• Integrated security features
• High performance and reliability
• Low-power for longer battery life
• Smaller footprint and lighter weight
• Ruggedized board and system packaging

Such FPGA-based solutions significantly reduce total system Size, Weight, Power and Cost (SWaP-C), as well as address stringent government security requirements specified within directives and regulations which pertain to Information Assurance (IA) and Anti-Tamper (AT) programs. Integrated systems which incorporate high-end PCI Express 2.0 I/O cards minimize bottlenecks and dramatically improve data throughput to the benefit of demanding radar, telemetry and signals intelligence applications.

Integrated systems, such as the TRC4007 rackmount computer, featuring the JXT6966 Single Board Computer and BPC7041 backplane, can accommodate up to nine PCI Express 2.0 FPGA option cards in a 4U rackmount enclosure and provides an integrated 8.4" LCD Display & keyboard/mouse tray along with support for up to three hot swap, front access 3.5" HDD storage drives. This configuration offers enough slots for multiple FPGA cards and enough storage to record critical telemetry data. The LCD display and integrated keyboard eliminates the need for an external monitor.