Lithium in Chile’s Desert

September 10, 2009 by  
Filed under Technology

Lithium is an important element that although is lightest in the world, but much part of  the world is glowing because of it. The metal is used in making batteries ranging from wrisBatteryt watch batteries to car’s and laptop’s batteries. China is currently the mass producer of Lithium and search for other reserves is constantly being carried out. It seems that Mr. McKenna has been a successful candidate to find Lithium. The man owns a company that produces lithium. He has found ready-made lithium in the driest forest of
the world in Chile. The forest is world’s driest and hot sun always chills down the blood of visitors. But for McKenna, the place has been no more than a gold mine. He says that sun has made it all. When snow from cold mountains reach underground and mixes in the salt with lithium, it makes brine. The brine is then processed ultimately making lithium carbonate. The metal has experienced a three percent rise in price and Mercedes is going to announce a plug-in-car whose battery will be 20 pounds in weight.

Nokia getting rid of Symbian OS

September 6, 2009 by  
Filed under Mobiles, Technology

Nokia is the founder of Symbian OS and also its biggest promoter. But now Symbian OSNokia has decided not to use Symbian OS in its further mobile phone devices. Nokia is backing off from Symbian OS because users have criticized a lot about slow operation and same old GUI (Graphical User Interface). Nokia has found other alternatives like Maemo OS that Nokia is using in its Internet Tablets. Symbian OS was a great platform with series like S60, S40, and UIQ etc. Symbian OS has been extensively used in many Nokia mobile phones but almost all Symbian phones are slow and become a victim of many problems. The recent phones that Nokia made like Nokia 5800 and N97 were not able to
capture the market and Nokia being the market leader can’t afford inadequate services to its customers. The Symbian OS was not the first OS to be used in handheld devices, but it was the most popular. Many third party applications were available for the Symbian OS which will definitely not supported by Maemo OS. The new Nokia phones will be better in response time, application flexibility and user interface. The downfall of Symbian market will surely pose threats to Symbian developers.

Telecom Boosters are safe – PTA

September 6, 2009 by  
Filed under Technology

The chairman PTA Dr Mohammed Yasin directed PTA to collaborate with PTA LogoFAB (Frequency Allocation Board) to check the power omission from transmitters and BST’s (Base Station Transceivers). The survey was conducted in 11 major cities of Pakistan including Lahore, Karachi, Islamabad, Faisalabad, Mirpur, Muzzafarabad, Quetta, Abbotabad, Rawalpindi, Hyderabad and AJK (Azad Jammu and Kashmir). Special tools were used to check that whether frequency and power emissions are as per directions or not. The result of survey depicted that power omissions in BST’s is quite less than the limits set by ICNRP (International Commission on Non-Ionizing Radiation Protection) and WHO (World Health Organization).  The survey was carried out because of extensive health threats posed by harmful radiations emitted by transmitters and other industry specific equipment. PTA says it will constantly scrutinize the power omission levels to ensure safety.

England’s town got cyber crimes

September 6, 2009 by  
Filed under Technology

The UK has become the land of cyber crimes. Almost 16m Euros were lost by ShildonSouth-east London in the previous year. Shildon is a small town in the county of Durham and statistics say that it is home of internet crime. The Third Man, a security company revealed that 24% of deliveries made in the area were fraudulent. It is said that Beds, Mobile Phones and Laptops are among the favorite stolen items. Mostly the fraud is done by hackers who hack the credit card information of credit card users and exploit that information to buy items. Official authorities say that Beds are favorite items for criminals because mostly criminals come from abroad and they need bed as a very first
necessity. Durham police investigations are not public because they are directed to report to the banks before making any proceedings. The Third Man says that just one or two persons are responsible for all the terrible happening. A crackdown operation is ongoing to catch the criminals. Online banking has become very insecure and people are losing confidence in it. A lady was caught red handed in Shildon who was sending fraudulently purchased items to criminals in Nigeria. The population of Shildon is just 10,000 but the area has become a headache for security agencies.

Computer has become lawyer

September 6, 2009 by  
Filed under Technology

Another breakthrough has been made in the field of Computer Science. European Scientists have made a computer named ALIS that is a ‘legal analysis query engine’. It is a perfect assistant for legal rules. The engine includes concepts of Artificial Intelligence, Game Theory and Semantics (contextual understanding) to provide assistance to legal matters. This time, the system is typically working for IPR (Intellectual Property Rights). The system is amazing; it not only offers advice but also given suggestions for conflict resolution and let both parties to hold consensus on certain terms. The concepts of Game Theory used in ALIS are vital for its decision making power. The system will help in understanding and uniform application of IPR and regulations like DRR (Digital Rights Regulation) which are becoming complex to understand day by day. Scientists are very hopeful about the huge success of this project. If ALIS becomes a successful lawyer than more projects will be made by Computer Scientists. More information can be obtained from www.alisproject.eu .

Does Google know you?

September 6, 2009 by  
Filed under Technology

One of the greatest traffickers of information is Google. It has a magical Googlesearch box that gives you whatever you want (conditions apply). Ironically saying, Google’s search box is a rabbit hole that goes deeper than you can imagine. If I had to make an abstract relationship diagram between cyber world’s information and its access, I would simply draw the globe and connect it to the Google search box via a line. So, Google knows everything and when it doesn’t know something, that thing either doesn’t exist or its
existence is oblivious to the world. Sometimes, I write my name in search box and search out whether I am known to the world or not. And alas! I don’t find myself there (because my name is too much common). I don’t find a single web page where somebody has written about me or my article is published. Whatsoever, the rule is simple, just write your name in Google search box and see the results. If you find yourself out there with some relevant prominence, you’re not a local person. But being on Google doesn’t mean that you find some pages of Orkut or Facebook where somebody has written you a scrap. Rather, it means that either somebody has written your biography in Wikipedia or some website has acknowledged your talents and they have admired you. People have discussed you on discussion boards or have made a fan club of you. The cyber world has introduced the concept of “Global Village” and has unified the still existing diversity in a wire. Now, almost everything can be searched out by search engines. Knowledge and information has become boundless and more saturation in its dispersion is observed. And those who don’t contribute into cyber world positively, they must break the ice. The world is much competitive now and we’re living in an age of exponential growth. Do you know that a when a graduate earns degree, the course he read in the first year of study may probably obsolete.  Today our graduate has much more knowledge in one year than a person in ancient times has its entire life. If in this advance era, people can’t find you on internet.

Freelancing and its scope

September 6, 2009 by  
Filed under Technology

A 9 to 5 job is not suitable for professionals whose work requires Freelancingbrainstorming of not more than an hour or so. Also, people who can perform their duties well within the realms of sophisticated wires, don’t fanaticize the idea of sitting idle on the desk of a single organization. There is less need of personal interaction in this fast-paced world where everyone is just a phone call away. If a freelancer does his assignments within given time, then rationally speaking there stands no reason why he should be available ‘in person’ to the organization. At present a large number of people all around the globe are working as freelancers. Only in USA, approximately 7.4% of the workforce is pursuing different types of freelancing. While freelancing is beneficial for freelancers in many ways; it is of great help for the companies too for which freelancers work. These companies can’t afford to give them cubicles and accommodations because usually freelancers are not region bounded. You can find a freelancer even in a small city of Peru. One more reason for freelancing is that some jobs have a variant or seasonal nature.
Organizations can’t afford monthly incomes and offices for such employees.
The future of freelancing is vibrant and uprising. Professionals don’t bother themselves to work within the bondage of offices and are free to share their expertise to many outsourcing organizations. On the other way round, companies don’t bother health insurance, social security, cubicles and monthly wages to freelancers.

An Introduction to Code Breaking

September 6, 2009 by  
Filed under Technology

As Human beings are certainly the most astounding creature among creatures. Their intelligence and innovation for survival has always been a Code Breakingflying colors phenomenon. The conspiracy of our neurons is what makes us the most distinguishing. Despite all that, human intelligence has been inclined to find new ways of creating chaos to find peace. One such quest for peace has lead to a concept known as code breaking. Code breaking is  simply the process of extracting real information wrapped within a clever idea for hiding it or breaking the code to get some sort of benefit out of it.  The history of code breaking is quite interesting. The codes itself are evident aspect of human being’s information hiding methodologies. Whether it is between friends or military leaders, we’ve always preferred some sort of formal or informal scheme to hide our actual information from unauthorized or malicious access. The most common codes we use are in sms. In wich v don write de whole stry rathr v write wut is ezily xpresable. This article is intended to provide a layman’s insight on code breaking’s history, present and future.

History:
It’s said that in about 3300 BC, the people of Mesopotamia (present geographical location – Iraq) developed a symbolic form of writing by observing the world around them. The symbols they created are known as pictograms. Each pictogram conveyed a whole idea. For instance, the head of a cow depicted a cow. This was the simplicity of a prospective stream of tremendous innovation in this field. Pictograms were also first used to keep record of the annual harvest. The ancient people of Maya civilization of Central America developed a more sophisticated procedure of making pictograms. Their meanings were not understood until 1980 when researchers found that each bar and dot on a pictogram represents numbers and complex pictures were amalgam of whole ideas and complex sounds. There were many civilizations like Mayans, Egyptians and Aztecs to name a few who developed symbolic approaches for communication. Today, the alphabets and numbers we use in our daily life are the sequel of the symbolism that human being started thousands of years ago. Today, however, we are more formal and logical in our approach.

« Previous Page