Friday, July 31, 2009

Who will Control Information Technology by 2010?

EDITOR: During the next three to five years, the international Internet system will evolve to the new IPV6 protocol standard, which will provide a quantum leap in comprehensive Internet capabilities. This will affect defense, economic prosperity, communications and sharing of information within nations and internationally, as well as daily household integration of hi tech systems. The current IPV4 system was developed and funded entirely by the United States Government and US private companies Whoever leads the development and deployment of IPV6 will, in fact, have a dominant role in being the architect and "toll keeper" of the rapidly growing international information superhighway.

The national security and economic stability of the United States has been based on control of the first generation of Internet communication technologies. Today, Asian countries have surpassed the United States in development and use of the next generation of Internet Protocol. Although Japan, Korea and Europe have joined with the United States in International Summits to set new Internet standards, China is secretly and substantially developing its own IPV6 infrastructure and solutions.

Beijing is taking advantage of technologies and investment from America and its allies. The concern of international economists, human rights advocates and defense experts is that Beijing will use its political and economic leverage in many areas of the developing world to eventually dominate new Internet standards, imbued with the repressive nature of its own non-democratic regime. In addition, whoever controls the distribution of the technologies related to the IPV6 will have the ability to monitor and block information, disrupt communications and, in a time of conflict, shut down entire IT systems vital to a nation's economy and defense.

IPV6, THE NEW INTERNET: The dominant edge of America's economic, communications and military leadership is based on a national investment made 50 years ago to create what became today's global Internet communications systems. At a June 28, 2005 testimony before the U.S. House of Representatives Committee on Government Reform, Alex Lightman, CEO of IPV6 Summit, stated, “...some $9 trillion out of America's $13 million economy is related to IT services, subscriptions and transactions... It is also responsible for the creation of millions of American jobs... And it is the backbone of thousands of products and services vital to the national defense and homeland security systems.”

Today, the US Government is investing a mere fraction of what Japan, Korea, China and Europe are investing into developing the New Internet IPV6 protocol. Each nation's IT standards reflect their own political and economic priorities. A repressive government's priorities are ultimately in contradiction with democratic openness necessary for international peace and prosperity. Thus far, the Defense Department is the only US federal agency showing incentive in New Internet competitiveness. But DOD, worn down by interventions in the Middle East and elsewhere, has a mere fraction of the funding needed to maintain an edge over America's competitors and adversaries.

CHINA's INTERNET LEAP FORWARD: Since 1994, China has emerged from practically no public Internet usage to become the world's second largest [after the United States] Internet population. Within two years, in 2007, China is expected to pass Japan as the world's largest IPV6 user. Meanwhile, the US Internet market is dominated by the rapidly out-of- date IPV4 standard model. IPV6 is increasingly dominant in Japan and Korea. Meanwhile, non- democratic China has refused to join a global coalition. Instead, Beijing is quietly and steady developing hardware and software in preparing to take the lead in providing IPV6, not only for its own economic and military modernization but also to protect the Communist Party's repressive dominance against its own citizens. Beijing can also use its political and economic leverage and advances in Internet censorship to protect dictators in developing countries across the world. More critically, as a component of “asymmetrical” electronic warfare, a country whose companies control and manage IPV6 technology can shut down entire IT systems.

THE CENSORSHIP "GOLDEN SHIELD" China has effectively "sanitized" its domestic Internet through extensive sophisticated on-line monitoring and censorship systems. This has been done with the willing assistance of high-profile US companies who seek greater play in the Chinese Government controlled market. Harvard University's Berkman Center for Internet and Society reports that China's Internet censorship regime is "the most sophisticated in the world." An Amnesty International investigation found that through early 2005, at least 54 persons were imprisoned for distributing "illegal" information through the Net.

A new Chinese Government high-tech surveillance project called "Golden Shield," has been under development for the past five years. US companies have flaunted the post-Tiananmen Square Massacre law that bans selling "crime control and detection" equipment to China, writes Anne Applebaum in the July 21, 2005 Washington Post. According to numerous press reports, American companies like Yahoo have signed a "public pledge of self-discipline" to abide by China Net censorship regime. Cisco Systems has reportedly sold technologies to Chinese internal security agencies that block admission to Web sites unfavorable to China's ruling minority, as well as certain material on sites otherwise accessible. And reportedly, Microsoft has altered the Chinese version of its blog tool, MSN Spaces, at the insistence of Communist information censors. The Orwellian collaboration between US companies and China's Internet censors can dramatically alter IPV6 standards and significantly degrade the free flow of information essential for international peace and prosperity.

Thursday, July 30, 2009

Method of Suppressing Errors in Many Types of Quantum Computers

Researchers at the National Institute of Standards and Technology (NIST) have demonstrated a technique for efficiently suppressing errors in quantum computers. The advance could eventually make it much easier to build useful versions of these potentially powerful but highly fragile machines, which theoretically could solve important problems that are intractable using today’s computers.

The new error-suppression method, described in the April 23 issue of Nature,* was demonstrated using an array of about 1,000 ultracold beryllium ions (electrically charged atoms) trapped by electric and magnetic fields. Each ion can act as a quantum bit (qubit) for storing information in a quantum computer. These ions form neatly ordered crystals, similar to arrays of qubits being fabricated by other researchers using semiconducting and superconducting circuitry. Arrays like this potentially could be used as multi-bit quantum memories.

The new NIST technique counteracts a major threat to the reliability of quantum memories: the potential for small disturbances, such as stray electric or magnetic fields, to create random errors in the qubits. The NIST team applied customized sequences of microwave pulses to reverse the accumulation of such random errors in all qubits simultaneously.

“Simulations show that under appropriate conditions this method can reduce the error rate in quantum computing systems up to a hundred times more than comparable techniques. Our measurement results validate these predictions,” says Hermann Uys, a NIST guest researcher who is a lead author of the paper. Uys is visiting from the Council for Scientific and Industrial Research, Pretoria, South Africa.

Co-lead author Michael J. Biercuk, a NIST post-doc, notes that correcting qubit errors after they occur will require extraordinary resources, whereas early suppression of errors is far more efficient, and improves the performance of subsequent error correction. The new NIST error-suppression method could enable quantum computers of various designs to achieve error rates far below the so-called fault-tolerance threshold of about 1 error in 10,000 computational operations (0.01 percent), Biercuk says. If error rates can be reduced below this level, building a useful quantum computer becomes considerably more realistic.

Quantum computers, by relying on the unusual properties of the atomic-scale world to store and process data, could someday break commonly used encryption codes, perform faster searches of enormous databases, and determine the most efficient schedules for everything from airlines to traveling salespeople. They could also simulate complex quantum systems that are too difficult to study using today’s computers or through direct experiments. But first, practical quantum computers need to be built, and their components need to be reliable.

Unlike today’s computers, which use transistors that are switched on or off to represent bit values of 1 or 0, quantum computers would manipulate the properties of qubits to represent 1 or 0 or—thanks to the peculiarities of the quantum world—both at the same time. But these “quantum states” are so delicate that qubit values would be highly susceptible to errors caused by the slightest electronic noise.

Under ideal conditions, and in the absence of deliberate manipulations, ion qubit states evolve in a predictable way, similar to a spinning top tipped from its vertical axis. Environmental interference can lead to a buildup of error, but the new NIST pulse method can reverse this accumulation, thus preserving the original state.

The NIST method is an adaptation of “spin echo” techniques used for decades to suppress errors in nuclear magnetic resonance (the basis of magnetic resonance imaging). In spin echo, evenly spaced control pulses will nearly reverse the buildup of error, as long as fluctuations are slow relative to the time between pulses.

Recently, scientists at another institution published a theory of how to modify pulse timing in order to improve noise suppression. The NIST team conducted the first experimental demonstration of this theory, and then extended these ideas by generating novel pulse sequences tailored to the ambient noise environment. These novel sequences can be found quickly through an experimental feedback technique, and were shown to significantly outperform other sequences without the need for any knowledge of the noise characteristics. The researchers tested these pulse sequences under realistic noise conditions simulating those appropriate for different qubit technologies, making their results broadly applicable.

The research was conducted in the laboratory of NIST physicist John J. Bollinger, the project lead, and funded in part by the Intelligence Advanced Research Projects Activity.

Wednesday, July 29, 2009

NIST and the World Trade Center

The collapse of New York City’s World Trade Center structures following the terrorist attacks of Sept. 11, 2001, was the worst building disaster in recorded history, killing some 2,800 people. More than 350 fire and emergency responders were among those killed, the largest loss of life for this group in a single incident.

In response to the WTC tragedy, the National Institute of Standards and Technology conducted a 3-year building and fire safety investigation to study the factors contributing to the probable cause (or causes) of post-impact collapse of the WTC Towers (WTC 1 and 2) and WTC 7; expanded its research in areas of high-priority need such as prevention of progressive collapse, fire resistance design and retrofit of structures, and fire resistive coatings for structural steel; and is reaching out to the building and fire safety communities to pave the way for timely, expedited considerations of recommendations stemming from the investigation.

Tuesday, July 28, 2009

Technology Advances to Whole-Carcass Imaging System by Fecal Detection


Microbiologists Tom Casey (left) and Mark Rasmussen evaluate a new laser for use in their fecal contamination detection system for meat carcasses. They are working in the laser lab of an Iowa State University collaborator, photochemist Jacob Petrich.

Dangerous bacteria such as E. coli O157:H7 are being spotlighted because Agricultural Research Service researchers in partnership with eMerge Interactive, Inc., of Sebastian, Fla., have further developed and tested commercial designs of a fecal detection system capable of scanning an entire beef carcass.

The device can help the meatpacking industry supply safe food products to U.S. and foreign consumers. In a recent trial of an eMerge prototype at the Food and Agricultural Products Research and Technology Center at Oklahoma State University, the detection system revealed trace levels of contamination that were invisible to the human eye, prior to and after trimming. The prototype was also successful in evaluating fecal decontamination on carcasses subjected to levels of high- temperature steam from steam vacuums or steam cabinets. This is a common practice used for microbial intervention in the beef slaughter industry.

The fecal detection technology was developed and patented by ARS scientists Thomas A. Casey and Mark A. Rasmussen, in collaboration with Iowa State University chemist Jacob W. Petrich. It has been exclusively licensed by eMerge and is being further developed under a cooperative research and development agreement.

Research and development engineers at eMerge have developed this technology into new prototypes that scan an entire side of beef for fecal contamination. This improves the technology's practicality for the beef packing industry.

USDA's Food Safety and Inspection Service has a zero-tolerance standard for visible fecal contamination on livestock and poultry carcasses. Visual inspection and carcass cleaning are the standard tools for reducing the potential for E. coli and other bacterial contaminants in slaughterhouses across the country. But the human eye is not sensitive enough to identify all of the fecal contamination that can occur on carcasses, according to Casey, who works with Rasmussen at the ARS National Animal Disease Center in Ames, Iowa. ARS is the U.S. Department of Agriculture's chief scientific research agency.

Monday, July 27, 2009

Cell phone test with water

Friday, July 24, 2009

Water Primrose Species

General Information

Water primroses are non-native perennial herbs found creeping along the shoreline, floating on the water surface, or growing upright. They are robust plants with bright yellow, showy flowers and willow-like leaves. They are non-native species originally from South America that have been introduced into Europe and North America. In Washington, L. hexapetala has established in the drainage ditches in the Longview/Kelso area of southwestern Washington. King County weed staff also discovered small populations of this species and also L. peploides in King County. We speculate that at one time, nurseries sold these species in Washington as aquatic garden plants. These species are very invasive and aggressive and form very dense mats of vegetation. Washington lists L. hexapetala as a Class B noxious weed and L. peploides as a Class A noxious weed. The Washington Department of Agriculture lists both species on its quarantine list that prohibits their sale, trade, or transport in Washington.

Growth Habit

These non-native primrose species grow in dense mats along shorelines and out into the water. They favor the margins of lakes, ponds, ditches, and streams. They bloom throughout the summer. This photograph shows L. hexapetala growing along a ditch bank in Longview. Both species reproduce by seeds and by plant fragments.

Management

The Longview Diking District uses mechanical methods to remove water primrose and other noxious plants from the canals and ditches in Longview/Kelso. Other methods such as cutting, covering with opaque materials, and using the aquatic herbicide (Rodeo®) may be effective. It is unlikely that grass carp would find water primroses palatable.

Identification

You can identify non-native water primrose species by their sprawling growth habit and showy yellow flowers.

Look for the following characteristics

  • Bright, yellow flowers; normally with 5 petals
  • Alternately-arranged, slightly hairy, willow-like leaves
  • Dense sprawling, tangled mat of vegetation

Skin diseases in workers at a perfume factory

The aim of this study is to find out the causes of skin diseases in one-third of the staff of a perfume factory, in which 10 different perfume sprays were being manufactured. Site inspection, dermatological examination and patch testing of all 26 persons at risk with 4 perfume oils and 30 ingredients of them. The results showed 6 bottlers were found suffering from allergic contact dermatitis, 2 from irritant contact dermatitis, 12 workers showed different strong reactions to various fragrances. The main causes of allergic contact dermatitis were 2 perfume oils (12 cases) and their ingredients geraniol (12 cases), benzaldehyde(9), cinnamic aldehyde (6), linalool, neroli oil, terpenes of lemon oil and orange oil (4 each). Nobody was tested positive to balsam of Peru. Job changes for office workers, packers or printers to other rooms, where they had no longer contact with fragrances, led to a settling. To conclude, automation and replacement of glass bottles by cartridges from non-fragile materials and using gloves may minimize the risk.

Thursday, July 23, 2009

Quick Facts About Spyware

Spyware is software installed on your computer without your consent to monitor or control your computer use. Clues that spyware is on a computer may include a barrage of pop-ups, a browser that takes you to sites you don't want, unexpected toolbars or icons on your computer screen, keys that don't work, random error messages, and sluggish performance when opening programs or saving files. In some cases, there may be no symptoms at all.

To lower your risk of spyware infections:

  • Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads.
  • Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.
  • Download free software only from sites you know and trust. Enticing free software downloads frequently bundle other software, including spyware.
  • Don't click on links inside pop-ups.
  • Don't click on links in spam or pop-ups that claim to offer anti-spyware software; you may unintentionally be installing spyware.

Wednesday, July 22, 2009

How to avoid phishing scams

To avoid phishing scams:

  • Don't reply to an email, text, or pop-up message that asks for personal or financial information, and don't click on links in the message. If you want to go to a bank or business's website, type the web address into your browser yourself.
  • Don't respond if you get a message – by email, text, pop-up or phone – that asks you to call a phone number to update your account or give your personal information to access a refund. If you need to reach an organization with which you do business, call the number on your financial statement, or use a telephone directory

Some identity thieves have stolen personal information from many people at once, by hacking into large databases managed by businesses or government agencies. While you can't enjoy the benefits of the Internet without sharing some personal information, you can take steps to share only with organizations you know and trust. Don't give out your personal information unless you first find out how it's going to be used and how it will be protected.

If you are shopping online, don't provide your personal or financial information through a company's website until you have checked for indicators that the site is secure, like a lock icon on the browser's status bar or a website URL that begins "https:" (the "s" stands for "secure"). Unfortunately, no indicator is foolproof; some scammers have forged security icons. And some hackers have managed to breach sites that took appropriate security precautions.

Read website privacy policies. They should explain what personal information the website collects, how the information is used, and whether it is provided to third parties. The privacy policy also should tell you whether you have the right to see what information the website has about you and what security measures the company takes to protect your information. If you don't see a privacy policy — or if you can't understand it — consider doing business elsewhere.

Tuesday, July 21, 2009

Health benefits

  • Eating a diet rich in fruits and vegetables as part of an overall healthy diet may reduce risk for stroke and perhaps other cardiovascular diseases.


  • Eating a diet rich in fruits and vegetables as part of an overall healthy diet may reduce risk for type 2 diabetes.


  • Eating a diet rich in fruits and vegetables as part of an overall healthy diet may protect against certain cancers, such as mouth, stomach, and colon-rectum cancer.


  • Diets rich in foods containing fiber, such as fruits and vegetables, may reduce the risk of coronary heart disease.


  • Eating fruits and vegetables rich in potassium as part of an overall healthy diet may reduce the risk of developing kidney stones and may help to decrease bone loss.


  • Eating foods such as fruits that are low in calories per cup instead of some other higher-calorie food may be useful in helping to lower calorie intake.

Monday, July 20, 2009

Pampas Helps To Shelter Our Dying out Species

The Brumby Labor Government will protect one of Victoria’s most endangered ecosystems by acquiring 15,000 hectares of native grasslands to offset the impact of urban growth in Melbourne’s west.

Environment and Climate Change Minister Gavin Jennings today released plans for the reserves as part of the Brumby Labor Government’s Delivering Melbourne’s Newest Sustainable Communities program.

“As Melbourne’s population grows, the Brumby Labor Government is taking action through these proposed grassland reserves to ensure the health of our environment as well as our communities,” Mr Jennings said.

“In cooperation with the Commonwealth Government we will evaluate the ecological value of the grasslands. The Brumby Labor Government will also run a consultation process to hear community views on access and possible uses of the grassland reserves around Mt Cottrell, south-east of Melton, and west of Werribee around Little River.”

The proposed 15,000 hectares of grassland reserves are one of Victoria’s most endangered ecosystems and cover the world’s largest remaining concentration of Volcanic Plains Grasslands.

“Less than 5 per cent of Victoria's original grasslands still remain. And only 2 per cent of this depleted area is currently protected in Victorian conservation reserves. We can’t afford to miss this chance to protect this endangered ecosystem,” he said.

Native grasslands provide habitat for a number of endangered species including the Golden Sun Moth, Striped Legless lizard, Grassland Earless-dragon, Spiny Rice-flower, Button Wrinklewort, Plains Wanderer and Growling Grass Frog.

The grasslands would also offset the 6918 hectares of land marked for urban development under the proposed changes to the Urban Growth Boundary.

Some land owners and occupiers will be affected by the grasslands reservation. Affected properties will be included within a Public Acquisition Overlay under the Planning Scheme. This will give the Brumby Labor Government first right of purchase if a property comes up for sale and will allow the Government the right to compulsorily acquire a property at the market value price.

Owners and occupiers of affected land are being notified by letter and are encouraged to make a submission on the proposed changes.

The grassland reserves are expected to be set up over the next 10 years depending on conditions set by the Commonwealth Minister for the Environment.

”Establishing this large area of grassland reserves will give developers of these new urban areas greater certainty by offsetting the environmental impact on the grasslands in one go, instead of dealing with them block by block,” Mr Jennings said.

“The Brumby Labor Government wants to ensure our grasslands are protected in the future, as Melbourne at 5 Million and the Victorian Transport Plan are implemented, for the benefit of all Victorian families.

“Local children and residents will be able to play an active role in the future restoration of these grassland reserves and it’s exciting to think that they will be able to help protect plants and animals that may not exist anywhere else in the world.”

The reserves effectively extend the You Yangs Regional Park which is highly valued by so many Victorians, increasing the open space and recreation opportunities available to Melbourne’s communities as they grow.

Wednesday, July 15, 2009

Security Management & Assurance

Information security is an integral element of sound management. Information and computer systems are critical assets that support the mission of an organization. Protecting them can be as important as protecting other organizational resources, such as money, physical assets, or employees. However, including security considerations in the management of information and computers does not completely eliminate the possibility that these assets will be harmed.

Ultimately, responsibility for the success of an organization lies with its senior management. They establish the organization's computer security program and its overall program goals, objectives, and priorities in order to support the mission of the organization. They are also responsible for ensuring that required resources are applied to the program.

Collaboration with a number of entities is critical for success. Federally, we collaborate with the U.S. Office of Management and Budget (OMB), the U.S. Government Accountability Office (GAO), the National Security Agency (NSA), the Chief Information Officers (CIO) Council, and all Executive Branch agencies. We also work closely with a number of information technology organizations and standards bodies, as well as public and private organizations.

Major initiatives in this area include the FISMA Implementation Project; extended outreach initiatives and information security training, awareness and education; and producing and updating NIST Special Publications on security management topics. Key to the success of this area is our ability to interact with a broad constituency-Federal and nonfederal-in order to ensure that our program is consistent with national objectives related to or impacted by information security.