Monday, January 31, 2011

Toughest Material Ever Is Stronger than Kevlar, Stainless Steel

    Toughest Material Ever Is Stronger than Kevlar, Stainless Steel
  • Stronger than stainless steel and even Kevlar, a new nanomaterial is lightweight and inexpensive. Possible applications range from reinforced steel to lightweight body armor and bulletproof glass.
  • Stronger than stainless steel and even Kevlar, a new nanomaterial is lightweight and inexpensive. Possible applications range from reinforced steel to lightweight body armor and bulletproof glass.A few months ago, we wrote about a high-tech exoskeleton that could be used by soldiers carrying heavy loads. Now, a new extremely strong, lightweight material could vastly improve that skeleton. A team of Israeli scientists has created a printable nanomaterial that boasts not only the toughest organic structure known to man, but also is lightweight and inexpensive to produce.
    Created by scientists at Tel Aviv University and the Weizmann Institute of Science in Rehovot, the new material is made up of millions of microscopic nanospheres. The spheres are self-assembled from N-tert-butoxycarbonyl (Boc)-protected diphenylalanine molecules. In their unprotected form, these molecules form the plaquelike substance in the brains of Alzheimer's patients.
    The tiny nanospheres range in size from 80 nanometers to just 2 microns—that's 40 times smaller that the diameter of a human hair. When assembled, the spheres become tougher than any other organic substance, even bullet-proof Kevlar.
    The tiny nanospheres range from 80 nanometers to just 2 microns. Despite their size, when assembled, the spheres form the toughest organic structure known to man.
    "When we applied force to measure these particles, diamond probes were the only thing that actually made an indentation," said Itay Rousso from the Weizmann Institute of Science in Rehovot. "It's quite astonishing that you can get such a strong material made of biological ingredients."
    The scientists suspect that the new material works in a similar way to Kevlar. They theorize that the strength comes from the molecules' planar form, as well as various electron interactions.
    "It's an open question, what gives rise to these extreme mechanical properties, but the spheres are very highly ordered," Rousso said.

    Possible applications for the material include lightweight, inexpensive body armor for military and police use. The scientists even theorize that printable body armor may be feasible some time in the future.
    "In principle it may be possible," said Ehud Gazit, a scientist at Tel Aviv University and a co-author of a new article in the journal Angewandte Chemie's international edition.
    "But we are thinking of more straightforward uses: to improve the mechanical properties of composite structures, such as ceramics and bulletproof glass," he added.
    "I think this is an amazing discovery," Kenneth Woycechowsky, a scientist at the University of Utah familiar with the research, told Discovery News. "The rigidity and stiffness of these spheres is unique, and surpasses any other known organic molecule, even Kevlar."
    "We have several patents and it is being licensed, so we hope to see it on the market soon," said Gazit. "But it always takes more time than one expects. Kevlar was invented in the 1960s, but only in the 1980s did it become incorporated into body armor."
     

Converting Waste Heat into Electricity

    Converting Waste Heat into Electricity
  • A new device that captures waste heat and converts it into electricity could increase the efficiency of solar panels, car engines and power plants—all while rendering CFCs and complicated turbines obsolete.
  • A new device that captures waste heat and converts it into electricity could increase the efficiency of solar panels, car engines and power plants—all while rendering CFCs and complicated turbines obsolete.A few weeks ago, I wrote about a new technique by which energy can be harvested from the air. Now scientists at the University of Arizona (UA) are looking to harness power from waste heat with a theoretical device that could reduce fossil fuel use, increase factory efficiencies and make chlorofluorocarbons (CFCs) obsolete.
    Current methods of heat conversion, such as refrigeration and steam turbines, require complex mechanics and ozone-depleting chemicals. In the new theoretical model, called a molecular thermoelectric device, a rubberlike polymer is placed between two metals, which serve as electrodes. The material could prove to be an inexpensive and environmentally friendly alternative to traditional heat-conversion devices.
    The ringlike structure of the molecules causes electrons to interfere with one another and build up voltage (source: Justin Bergfield, University of Arizona).
    "Thermoelectricity makes it possible to cleanly convert heat directly into electrical energy in a device with no moving parts," says Justin Bergfield, a doctoral candidate in the UA College of Optical Sciences. "Our colleagues in the field tell us they are pretty confident that the devices we have designed on the computer can be built with the characteristics that we see in our simulations."
    The scientists' work relies on basic laws of quantum physics, particularly wave-particle duality. In this law, tiny particles, such as electrons, can exist as both particles and waves.
    "In a sense, an electron is like a red sports car," explains Bergfield. "The sports car is both a car and it's red, just as the electron is both a particle and a wave. The two are properties of the same thing. Electrons are just less obvious to us than sports cars."
    The team applied the laws of quantum physics to their work with polyphenyl ethers, molecules that spontaneously amass into polymers. Polyphenyl ether molecules have backbones of benzene rings, which form from carbon atoms. The unique chain-link structure of these molecules allows electrons to easily travel.
    "We had both worked with these molecules before and thought about using them for a thermoelectric device," Bergfield says, "but we hadn't really found anything special about them until Michelle Solis, an undergrad who worked on independent study in the lab, discovered that, low and behold, these things had a special feature. As you increase the number of benzene rings in each molecule, you increase the power generated."

    In the specially designed molecules, electron waves—passing through the benzene rings at different intervals—cancel each other out through a process known as quantum interference. Interrupting the electric flow by placing a temperature difference across the circuit leads to a build-up of voltage between the two electrodes.
    "We are the first to harness the wave nature of the electron and develop a concept to turn it into usable energy," states Charles Stafford, an associate professor of physics at UA.
    Charles Stafford (left) and Justin Bergfield demonstrate how electrons flow around a benzene ring (Daniel Stolte, University of Arizona). 
    The new device requires no moving parts and is self-contained, easy to maintain and inexpensive to manufacture compared with current technology.
    "You could just take a pair of metal electrodes and paint them with a single layer of these molecules," Bergfield explains. "That would give you a little sandwich that would act as your thermoelectric device. With a solid-state device, you don't need cooling agents, you don't need liquid nitrogen shipments, and you don't need to do a lot of maintenance.
    "The effects we see are not unique to the molecules we used in our simulation," Bergfield continues. "Any quantum-scale device where you have a cancellation of electric charge will do the trick, as long as there is a temperature difference. The greater the temperature difference, the more power you can generate."
    The scientists envision many possible applications for their device, from solar panels to car engines. "Solar panels get very hot and their efficiency goes down," Stafford states. "You could harvest some of that heat and use it to generate additional electricity while simultaneously cooling the panel and making its own photovoltaic process more efficient.
    "With a very efficient thermoelectric device based on our design, you could power about 200 100-watt light bulbs using the waste heat of an automobile," he says. "Put another way, one could increase the car's efficiency by well over 25 percent, which would be ideal for a hybrid since it already uses an electrical motor."
    The scientists' findings were published in the September issue of the journal ACS Nano. Funding was provided by the UA physics department.

Friday, January 28, 2011

Motivational Moment

"Seek not to change the world, but choose to change your mind
about the world. What you see reflects your thinking. And your
thinking but reflects your choice of what you want to see."

Quote from A Course in Miracles

Thursday, January 27, 2011

IT Contest Promotes Steaming Hash

    IT Contest Promotes Steaming Hash
  • Five finalists have been chosen in a federally sponsored contest to create the next generation of hash algorithms for IT.A federally sponsored contest seeks to develop next-generation hash algorithms. One of five new algorithms, chosen from among an original field of 64, will be used for everything from storage access to cryptography—making it a key instrument in the toolbox of modern IT organizations.
    Hash algorithms improve data storage access times, provide random number generation, ensure the authenticity of digital documents—from digital signatures to authentication codes—as well as streamline cryptographic applications. The contest winner will augment the hash algorithms currently specified in Federal Information Processing Standards Secure Hash Standard, authorizing a third-generation of Secure Hash Algorithms (called SHA-3).


    The hash functions by transforming the content to be stored (here telephone numbers) into index codes that can quickly retrieve that data (source: Wikipedia). 
    A hash function implements a simple, easy-to-execute algorithm that maps input values (derived from the content to be stored) to an index—called the hash code—that can be used for quick retrieval. Hash tables hold these index values plus the real physical address of the stored data, allowing quick retrieval of documents from the hash table. The bane of hash functions are collisions—data sets that produce the same hash code—which must be gracefully reconciled by the hash algorithm.
    The current SHA-3 Cryptography Competition concentrates on security applications of hash functions, which take arbitrary blocks of data and derive a fixed-size index (called a digest). Indexing secure messages with a hash digest aims to satisfy four competing goals: ease of computing the digest, minimizing collisions, guaranteeing that changes in the message will result in a different digest, and guaranteeing that the message cannot be "reverse-engineered" from the digest.

    The National Institute of Standards and Technology (NIST), which recently selected the five finalists, is sponsoring the contest to counter advances in cryptanalysis of hash algorithms that security-busting organizations—from hackers to foreign governments—have recently demonstrated as capable of defeating the current SHA-2 standard. The winner of the contest will help fill this security hole with SHA-3.


    Cryptographic hash functions transform messages into digest codes that are unique, and which cannot be reverse-engineered to reveal the original (source: Wikipedia).  
    Three rounds of selection have narrowed the field of competitors from 64 to 14 in the second round, which has now advanced to the third round with NIST's selection of five finalists:
    ● "Blake" submitted by Jean-Philippe Aumasson (Nagravision SA, Cheseaux, Switzerland), Luca Henzen (ETHZ, Zürich, Switzerland), Willi Meier (FHNW, Windisch, Switzerland) and Raphael C.-W. Phan (Loughborough University, UK)
    ● "Grøstl" submitted by Søren Steffen Thomsen, Martin Schläffer, Christian Rechberger, Florian Mendel, Krystian Matusiewicz, Lars R. Knudsen and Praveen Gauravaram from Technical University of Denmark (DTU) and TU Graz
    ● "JH" submitted by Hongjun Wu
    ● "Keccak" submitted by Guido Bertoni, Joan Daemen and Gilles Van Assche (STMicroelectronics), and Michaël Peeters (NXP Semiconductors)
    ● "Skein" submitted by Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker.
    2011 will allow a yearlong public review of the algorithms, the winner of which will be announced in 2012. See details on the review process here.
     

Wednesday, January 26, 2011

Job Search Difficulty Index for Major Cities

From last year but shows how hard we have it hear the the "D".

 Juju.com Releases Job Search Difficulty Index for Major Cities (January 2010)

New York, NY--January 2010 -- Juju.com, a leading job search engine, has released the updated Job Search Difficulty Index, which measures the difficulty of finding employment in major cities around the country. The Index was calculated by dividing the number of unemployed workers in each metro area, as reported by the Bureau of Labor Statistics (BLS), by the number of jobs in Juju's comprehensive index of millions of online jobs in the United States, which is compiled and updated continuously from thousands of employer career portals, recruiter websites, and job boards all over the Internet.
Job Search Difficulty
(Least -> Most)
Metro Change Since Last
Ranking
Unemployed
Individuals Per
Advertised Job
Population Rank
1 Washington, DC 0 1.93 9
2 San Jose, CA 0 2.50 31
3 Baltimore, MD 0 2.93 20
4 Salt Lake City, UT 2 3.22 49
5 New York, NY 0 3.32 1
6 Hartford, CT 1 3.47 45
7 Boston, MA -3 3.72 10
8 Denver, CO 0 3.95 21
9 Austin, TX 1 4.06 36
10 San Antonio, TX -1 4.40 28
11 Oklahoma City, OK 0 4.48 44
12 Pittsburgh, PA 2 4.83 22
13 Virginia Beach, VA -1 5.02 35
14 Seattle, WA 4 5.10 15
15 Milwaukee, WI 1 5.11 39
16 Indianapolis, IN -3 5.15 33
17 Richmond, VA -2 5.23 43
18 Dallas, TX -1 5.27 4
19 St. Paul, MN 3 5.39 16
20 Philadelphia, PA -1 5.42 5
21 San Francisco, CA -1 5.77 13
22 Nashville, TN 4 5.90 38
23 Phoenix, AZ 5 5.92 12
24 Houston, TX 0 5.94 6
25 Kansas City, MO 0 6.02 29
26 New Orleans, LA 3 6.03 46
27 Atlanta, GA -4 6.05 8
28 Charlotte, NC 2 6.33 34
29 Columbus, OH -2 6.33 32
30 Cleveland, OH -9 6.45 26
31 Louisville, KY 2 6.86 42
32 Rochester, NY -1 6.89 50
33 Buffalo, NY 1 7.13 47
34 San Diego, CA 1 7.17 17
35 Tampa, FL -3 7.43 19
36 Chicago, IL 0 7.56 3
37 Cincinnati, OH 0 8.16 24
38 Memphis, TN 1 8.40 41
39 Jacksonville, FL -1 8.75 40
40 Birmingham, AL 3 9.14 48
41 Providence, RI 1 9.18 37
42 Portland, OR -2 9.26 23
43 Orlando, FL -2 9.28 27
44 Sacramento, CA 1 10.61 25
45 Las Vegas, NV 1 10.72 30
46 Los Angeles, CA -2 10.82 2
47 Riverside, CA 0 11.90 14
48 Miami, FL 0 14.06 7
49 St. Louis, MO 0 18.63 18
50 Detroit, MI 0 20.01 11
The Job Search Difficulty Index provides a useful guide to the relative difficulties faced by job seekers in particular geographies, but should be considered in the context of the well known challenges of measuring and analyzing unemployment data.

Monday, January 24, 2011

Top 11 IT Skills for 2011

 Top 11 IT Skills for 2011

Randy Muller, MCT, MCSE, MCSA, MCDST



During the economic downturn, many American companies saw months of staff reductions through layoffs and delays in hiring replacement workers for those who have retired or left the company. Many companies held off performing upgrades to their current systems or delayed implementing new systems altogether. The good news is that the IT economic doldrums seems to be changing. Companies are planning to hire new workers or have started to hire again as they need skilled personnel for these new endeavors. Now that companies have made the decision to hire new IT personnel for these upgrades and new systems, just what skill sets will be in demand for 2011?

1. Cloud Computing

In its simplest state, cloud computing is the delivery of hardware and application services over the internet on demand. This is done as an alternative to hosting and maintaining your own servers and application software. In cloud computing, businesses only pay for the resources that they consume. Businesses that host services and applications in the cloud improve overall computer utilization rates, as servers are running at or near full capacity from clients connecting remotely. Cloud computing offers several models:
  1. Software as a Service (SaaS) - Providing an application that clients can access through the internet.
  2. Utility computing - Where storage and server computing power available when required
  3. Web and Platform Services - Providing a platform where developers can create applications that can be accessed by clients through the internet. Instead of using your own server infrastructure, you use these remote servers. Microsoft's Azure platform provides just such an environment.

2. Programming

A computer programmer or software engineer is one of the most sought-after and lucrative careers in the IT field. In today's business environment, companies must be able to quickly adapt to new conditions. In this case, rapid programming and agile programming are making a comeback. What are hot areas for programmers in 2011 - Cloud Computing, Flash, HTML5, Silverlight, Touchscreen, and other such technologies.

3. Virtualization

Virtualization is having multiple physical servers moved to a virtual machine environment. Virtualization vendors such as Citrix, VMware, and Microsoft are making it possible for companies to improve the efficiency and availability of IT resources and applications. Virtualization is being adopted by companies of all sizes as a means to reduce costs through consolidation of servers and lower cooling requirements. Application Virtualization has become very popular with businesses. Having the skill set to deploy applications that connect securely through a browser is critical for companies that have numerous offices.
This is one area that is going to be very interesting to watch in 2011 - especially due to the dynamics between Cisco, Microsoft, and VMware. There is no doubt that the demand for skills in this arena will grow exponentially.

4. Voice

Pick your voice flavor of choice, Lync Server 2010, Polycom, Avaya, or Cisco to name but a few. They all require highly skilled and knowledgeable people. This is even more so when trying to integrate conferencing or Unified Messaging into the network. VoIP is growing rapidly. Businesses are demanding the integration of voice with their messaging and conferencing networks. The problem is there just aren't that many experienced voice people, especially ones who are skilled in two or more platforms. If you happen to be a Cisco voice guru and have also mastered the intricacies of Office Communications Server 2007 R2 Unified Messaging and conferencing, than you are set!

5.Project Management

Project Managers are always in demand; this is especially for IT Project Managers. IT Project Managers must have an understanding of the business on a larger scale as well as knowledge of the IT world. This skill set will be in great demand as companies will be upgrading their IT environments next year.

6. Business Intelligence

Companies are constantly compiling, processing and maintaining vast amounts of data. Businesses will require developers who can work with the business side and who also understand user requirements. These individuals can develop the necessary codes and tools that can be delivered through user-friendly portals (think SharePoint).

7. Security

Security will always be a hot demand skill set. All IT pros must have a good understanding of both physical and electronic security. One of the most difficult tasks with IT security is educating users. More information about a company can be gleaned through social engineering that they would rather not have divulged. Training users (and IT staff) to be cognizant of and prevent social engineering is extremely difficult. IT Pros must always be aware of security issues and understand the vulnerabilities within their networks (from operating systems, servers, even the lowly cable closet). This does not mean that every IT Pro must be able to perform a penetration test against their own network, but they must understand and prevent attacks against their network.

8. Web 2.0

Web 2.0 is commonly thought of as the interaction of social media, networking sites, blogs, and wikis that facilitate communication and information sharing. A Web 2.0 site allows users (customers) to choose their interaction experience. Many companies now have Facebook, Twitter, or other social media sites established. Developers and other individuals who experience using Adobe Flex, JavaScript, Adobe Flash, AJAX, and JavaScript Object Notation will be highly sought after in 2011.

9. Unified Communications

We live in a highly connected world (perhaps too connected at times) with numerous communication technologies all competing for our attention. These disparate communications technologies were all developed and have grown into commonly accepted use separate from one another. In order to use these technologies, we may have had several accounts: one for conferencing, another for email, a third for instant messaging, and yet another for voicemail and even perhaps other accounts. Each of these systems most likely had separate user names and passwords. In order for users to access them, they would have had to remember them (or write down). Network and telephony administrators had to keep these different systems working, sometimes with limited success and much difficulty.

10. Social Networks and Networking

It is a serious mistake to underestimate the power of social networks (whether it be IMs, tweets, or the "old school" email). Social networks have been used to help free people who have been incarcerated overseas, organize popular social and music events and even keep in touch with family and friends. Social networks have tremendous power and influence - far more than most people realize (and probably want to accept either). The "traditional" workplace is quickly changing; more people are working from home or from other locations and want and even need this contact. This does not mean the real-time interaction of the bricks-and-mortar work place environment have been lost, just changed. If you are curious, tweet a friend and ask.
People keep in contact through Facebook or other social sites, blurring the line between work and social boundaries. The use of Microsoft Office Communicator will allow users to have both business and personal contacts in one IM interface. Business and IT leaders will have to learn to use these to accelerate the business-decision process and maintain relevance with workers. Customers will expect immediate answers to questions, and employees can accomplish more through these communications.

11. Helpdesk

Trained and competent people at the helpdesk will be critical in 2011 as companies continue to migrate to Windows 7. One of the most critical skills that IT pros need is how to interact with non-technical people. The Help Desk is the first interaction most users have with the IT department, and it should be a positive experience. IT Pros are very good at their jobs, but sometimes lack the ability to relate to their non-tech colleagues. Users just want their computers fixed or their data recovered,l and are not concerned with the processes behind our actions.

Motivational Monday

Napoleon Hill's Thought for the Day (graphic)
Don’t push others around if you have no blisters on your own feet.

Good officers lead by example and make sure the troops are cared for before attending to their own needs. When you treat others respectfully and never ask another to do something you would be unwilling to do yourself, you are entitled to the respect of others -- and they will freely give it. But you cannot expect others to continue marching until they have blisters on their feet while you ride in the jeep. Leading others means you must be willing to give far more of yourself than you would ever ask from them.

Permanent link to this post: Don’t push others around if you have no blisters on your own feet.

Thursday, January 20, 2011

3 Reasons Flexible Electronics Enable Smarter Displays

    3 Reasons Flexible Electronics Enable Smarter Displays
  • For a decade or more, flexible electronics has been just over the horizon, beaconing from a future where all mobile computerized equipment could be rolled up like a bedroll for transportation. Despite these unfulfilled expectations, here are three ways that smarter displays are realizing the unfulfilled dreams of flexible electronics.
  • For a decade or more, flexible electronics has been just over the horizon, beaconing from a future where all mobile computerized equipment could be rolled up like a bedroll for transportation. Despite these unfulfilled expectations, here are three ways that smarter displays are realizing the unfulfilled dreams of flexible electronics.Flash Gordon popularized the idea of flying cars more than 50 years ago, but still they are not here. Likewise, the era of mobile computers that you can roll up like a scroll could still be a dream 50 years hence.

    Nevertheless, the technologies that caused all the speculation about flexible electronics are already revolutionizing the multi-billion-dollar display industry. Theoretically, flexible displays could be rolled up like a blueprint or pulled down like a window blind. The reality, however, is that flexible, printable, organic electronics are finding their best uses in cost-reducing three aspects of the manufacturing of electronic displays (albeit without making the entire display flexible).



    Arizona State University's Flexible Display Center shows its active-matrix electrophoretic display based on E-Ink flexible touchscreen. Instead of using stiff glass for support, it uses a flexible DuPont Teijin Film. 
    According to Lux Research, which held a webinar on the subject Jan. 18 called “Sorting Hype From Reality in Printed, Organic, and Flexible Display Technologies,” there are three values that flexible electronics technologies are adding to modern displays.

    1. Frontplane: The active display layers that provide pixel-level coloring have already been revolutionized by flexible display layers such as the electrophoretic technology used in Amazon's Kindle. Electrophoretic displays are built with flexible polymers instead of stiff silicon crystals, even though the rest of the display is stiff by virtue of the glass covering that protects it from spilled coffee.

    For the future, active-layer frontplanes will be available using a wide variety of flexible electronic technologies, from organic light-emitting diodes (OLEDs) with super-wide-gamut color resolution to electro-wetting display technologies that have the ultra-low-power features to extend battery life in mobile devices, but can display fast-moving color video that a Kindle can't touch.

    2. Backplanes: Thin-film transistors (TFTs) supply the signal to turn pixels on and off, necessitating a one-to-one relationship between pixels and TFTs (for instance, a five-megapixel display has five million TFTs). Today, silicon photo-masks are used to fabricate TFTs by laying down tiny patterns of photoresist on silicon sheets, which can then be etched into the shape of the desired thin-film transistors. However, techniques enabling printers to lay down the TFTs directly will soon lower the cost and manufacturing complexity of electronic displays.

    3. Transparent Electrodes: The reason that displays appear to be transparent, despite the fact that every pixel is connected to a TFT that is printed on its backplane, is that the "wires" used to supply signals to the TFTs are transparent. Today, transparency is achieved by using indium tin oxide (ITO), which is becoming increasingly rare, thus driving up the manufacturing costs of displays. However, new formulations of flexible nanowires that can be printed at room temperature using silicon, silver, and pure carbon—graphene—promise to lower the cost of displays further by eliminating the need for costly ITO.
     

Wednesday, January 19, 2011

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits

By Bill Snyder

Happy anniversary Basit and Amjad! Twenty-five years ago this month, the Alvi brothers of Lahore, Pakistan, gave the world the Brain Virus, the first bit of malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business address in the code and later told Time magazine they had written the virus to protect their medical software from piracy.
Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is anything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned.

Slideshow: Quiz: Separate Cyber Security Fact From Fiction7 Cybercrime Facts Executives Need to Know

No longer just a way to make a political point or demonstrate one's technical prowess, malware has become a useful tool in the bag of tricks bad guys use to steal from consumers and institutions alike. And just as big-time drug dealers and many criminal gangs now mimic the ways of legitimate business, hackers have begun to do the same.
One particularly disturbing trend coming to light in this anniversary month is the production and online sale of "kits" that allow relatively unskilled hackers to create and launch malware attacks. And by "kit" I really do mean a kit. "Attack toolkits are bundles of malicious code tools used to facilitate the launch of concerted and widespread attacks on networked computers. Also known as crimeware, these kits are usually composed of prewritten malicious code for exploiting vulnerabilities along with various tools to customize, deploy, and automate widespread attacks," according to a recent report by Symantec.
Marc Fossi, a development manager for the giant security company, says attack kits are selling on the Web from $40 or $50 to about $4000. Some hackers peddling the higher-end kits even offer online support and subscription services, so customers can get updated versions of the malware. Symantec has also observed advertisements offering to help install and set up purchased attack kits for a fee. "It's like a mirror of the legitimate software business," he says.

Here are six reasons to be concerned:
1. Attack kits make it easier for relatively unsophisticated hackers to launch an attack. That's not to say that any computer-illiterate bozo could successfully use one of these kits, but it's much easier than building a virus or other malware from the ground up, says Fossi.
2. The prevalence, simplicity and effectiveness of the attack kits are contributing to an upward spike in cybercrime. For example, one major kit called ZeuS accounted for more than 90,000 unique malicious code variants as of August 2009. That's 90,000 different malware applications; the number of computers attacked by ZeuS is in the millions. Not coincidentally, ZeuS is designed primarily to steal financial details, such as the online banking credentials of a victim. Its ease of use and ability to generate income makes it an appealing purchase for even novice cybercriminals.
3. Cyber criminals, like legitimate business people, believe in a return on investment. Since they're spending money to buy those attack kits, it's likely they'll want to use them.
4. Because buyers of the kits can get updates, they're using the newest and most potent versions of the malware, and that, of course, means users will be hit even harder.
5. Increasingly, attack toolkits include exploits for vulnerabilities that encompass multiple applications and technologies. This increases the likelihood that an attack will succeed because there is a greater chance that the victim will be using one of the vulnerable applications and that one of the applications is unpatched.
6. The attack kits spew out malware that can attack multiple platforms; so users of Macs or computers running the Linux operating system, which are usually considered safer than Windows, are at risk as well.
Naturally, you want to defend yourself against these clowns. Some of the viruses and other kinds of malware are so that new your anti-virus and other types of protection might not recognize them, but many are known. So be sure you're running reputable defense programs and keep them updated. And since many of the kits rely on "poisoned" Web sites, make certain that if your malware detector questions the authenticity of a site you pay attention and get out of there without clicking on anything.
It's tempting to make jokes about those two wild and crazy guys from Pakistan, and to be sure, the story of the Brain Virus has its place in computer lore. But ultimately, this stuff isn't funny, and it's not really a happy anniversary.

Tuesday, January 18, 2011

Thunderstorms Emit Beams of Antimatter, NASA Discovers

Thunderstorms Emit Beams of Antimatter, NASA Discovers

HUNTSVILLE, Alabama, January 18, 2011 (ENS) - For the first time, antimatter has been observed occurring naturally on Earth, as scientists using NASA's Fermi Gamma-ray Space Telescope have documented beams of antimatter produced above thunderstorms. The scientists think the antimatter particles are formed inside thunderstorms in terrestrial gamma-ray flashes associated with lightning. They estimate that about 500 gamma-ray flashes occur daily worldwide, but most go undetected.
Electric fields near the top of the storm create an upward-moving avalanche of electrons. (Image courtesy NASA)
"These signals are the first direct evidence that thunderstorms make antimatter particle beams," said Michael Briggs, a member of Fermi's Gamma-ray Burst Monitor team at the University of Alabama in Huntsville. He presented the team's findings last week at the American Astronomical Society meeting in Seattle.
Antimatter is one of the mainstays of science fiction but it is "rare in the present-day universe," NASA says, explaining that antimatter is called the "mirror image" of ordinary matter, because for every type of ordinary matter particle, an antimatter particle can be created that is identical except for an opposite electric charge.
Antimatter is created in solar flares on the Sun and clouds of antimatter have been observed in the Milky Way, our home galaxy, but the phenomenon has never before been seen on Earth.
Acting like enormous particle accelerators, thunderstorms can emit terrestrial gamma-ray flashes, called TGFs, as well as high-energy electrons and positrons, which are the antiparticles of electrons.
Moving near the speed of light, these particles travel into space along Earth's magnetic field. The NASA scientists now think that most terrestrial gamma-ray flashes also produce particle beams and antimatter.
Launched June 11, 2008, NASA's Fermi Gamma-ray space telescope is designed to monitor gamma rays, the highest energy form of light, from its orbit 350 miles above the Earth.
When antimatter striking Fermi collides with a particle of normal matter, both particles immediately are annihilated and transformed into gamma rays.
High-energy electrons and positrons escape into space by spiraling along Earth's magnetic field. (Image courtesy NASA)
The Gamma-ray Burst Monitor has detected gamma rays with energies of 511,000 electron volts, a signal indicating an electron has met its antimatter counterpart, a positron.
Although Fermi's Gamma-ray Burst Monitor is designed to observe high-energy events in the universe, it also provides insights into the antimatter phenomenon.
The Gamma-ray Burst Monitor constantly monitors the entire sky, circling the Earth every 90 minutes. The Gamma-ray Burst Monitor team has identified 130 terrestrial gamma-ray flashes since the Fermi space telescope was launched.
"In orbit for less than three years, the Fermi mission has proven to be an amazing tool to probe the universe," said Ilana Harrus, Fermi program scientist at NASA Headquarters in Washington. "Now we learn that it can discover mysteries much, much closer to home."
For most of terrestrial gamma-ray flashes that were observed, the space telescope was located immediately above a thunderstorm, but in four cases, storms were far away and the only lightning at the time was hundreds of miles away.
During a terrestrial gamma-ray flash on December 14, 2009, the Fermi telescope was located over Egypt. But the active storm was in Zambia, some 2,800 miles to the south. The distant storm was below Fermi's horizon, so any gamma rays it produced could not have been detected.
"Even though Fermi couldn't see the storm, the spacecraft nevertheless was magnetically connected to it," said Joseph Dwyer at the Florida Institute of Technology in Melbourne. "The TGF produced high-speed electrons and positrons, which then rode up Earth's magnetic field to strike the spacecraft."
Here a terrestrial gamma-ray flash is 1.98 milliseconds old. Its electron/positron beam is reaching altitudes where it can intercept NASA's Fermi Gamma-ray Space Telescope. (Image courtesy NASA)
The beam continued past Fermi, reached a location, known as a mirror point where its motion was reversed, and then hit the spacecraft a second time just 23 milliseconds later.
Each time, positrons in the beam collided with electrons in the spacecraft. The particles annihilated each other, emitting gamma rays detected by Fermi's Gamma-ray Burst Monitor.
Scientists long have suspected terrestrial gamma-ray flashes arise from the strong electric fields near the tops of thunderstorms. Under the right conditions, they say, the field becomes strong enough that it drives an upward avalanche of electrons.
Reaching speeds nearly as fast as light, the high-energy electrons give off gamma rays when deflected by air molecules.
Normally, these gamma rays are detected as a terrestrial gamma-ray flash. But the cascading electrons produce so many gamma rays that they blast electrons and positrons clear of the atmosphere. This happens when the gamma-ray energy transforms into a pair of particles: an electron and a positron. It is these particles that reach Fermi's orbit 350 miles above the Earth.
The detection of positrons shows many high-energy particles are being ejected from the atmosphere. In fact, scientists now think that all TGFs emit electron/positron beams. A paper on these findings has been accepted for publication in the journal "Geophysical Research Letters."
"The Fermi results put us a step closer to understanding how TGFs work," said Steven Cummer, an atmospheric electricity scientist and associate professor at Duke University. "We still have to figure out what is special about these storms and the precise role lightning plays in the process."

The BDPA Insider - January 16, 2011

The BDPA Insider - January 16, 2011


 
The BDPA Insider - January 16, 2011

What better way to start the day than with your weekly message from BDPA!
In this issue:


2011 NATIONAL BDPA TECHNOLOGY CONFERENCE "CALL FOR PRESENTERS"
Route 66: The Road to the 2006 National BDPA HSCC Championship
Message from New York Chapter President
Grant Approval: Microsoft ($17,910)
Blacks in Science and Technology
Youngest African American Male Bio-Engineer
IT in 2011: The State of the Employment Market

Click here for the latest issue of "The BDPA Insider":
 
Click here for "The BDPA Insider" Archives:

 
The 2011 conference is rapidly approaching, and we are gearing up to take this exciting event to new heights in Chicago!  We are actively seeking presenters who will ...

IgniteInspire and Empower:

our conference workshop attendees and equip them with the necessary tools, resources, and/or information needed to prepare them for becoming the best technologists they can be.  
Please review the attached submission requirements and specifications for "Call for Presenters" or click on the link below:

Click here for more:


Gibran McDuffie is the coordinator of the Student Information Technology Education & Scholarship (SITES) program conducted each year by BDPA Chicago chapter. One of the components of the SITES program is the annual High School Computer Competition (HSCC).

There have been 25 HSCC championships held in the United States since the first one took place back in 1986. In recent years the HSCC championships have been dominated by the BDPA chapter in Rochester, MN.
2006 HSCC Champions (Chicago)

However, there is one team that has beaten BDPA Southern Minnesota over the past six years. BDPA Chicago's HSCC team won the national championship in 2006.
Click here for more: 

 
Dear BDPA Members and Supporters,

BDPA New York is officially inviting high school and college students to participate in our 2011 Information Technology (IT Showcase) program.

The Information Technology (IT) Showcase allows student presenters to showcase their talents by presenting technology based research projects. The presentations represent advanced STEM based topics delivered by highly motivated high school and undergraduate college students. Each student researches a technology based topic and drafts a college level research paper. The students also prepare a poster or information board presenting the results of their research. The papers are submitted for presentation to corporate, educational and industry leaders. Student papers are sometimes published and the students may be invited to present at professional Technology workshops such as the TeraGrid and the National BDPA Annual Technology Conference. 


Click here for more:

 
BDPA Education and Technology Foundation (BETF) works each year to obtain any software needed by BDPA for its programs and services. One of our partners in this effort is Microsoft.

We work through the folks at Tech Soup to request software donations from Microsoft. We were pleased to learn that Microsoft approved $17,910 in software donations

Click here for more:

Tyrone Taborn, the publisher of Career Communications Group, served on the BDPA Board of Directors for a number of years. Tyrone uses the media to document the progress of African Americans in science, engineering and technology. His company created the following video that shares our legacy in these fields.

Click here for more:

By Kai Dupe, Where are Blacks in Technology
 
Cortlan James Wickliff, at nineteen (19) years old, was the youngest African-American male to attain a bioengineering degree from Rice University in Houston, Texas. Cortlan is now attending Harvard Law School to complete a JD in Intellectual Property and Patent Law. He also plans to complete a PhD in Biomedical Engineering.

From an early age he has displayed a profound and unusual sense of the world in which he lives and the role that he has been called to play as a student, leader and community activist, regularly seeking to give back and encourage his peers to likewise pursue stretch goals. A few weeks after his 15th birthday, Cortlan left home to began his college experience at the University of North Texas. 

Click here for more:

2010 has been a year of significant change for the IT industry – but what does 2011 hold for the IT professional? This report provides insight into the IT market, including job prospects and IT strategies for the year ahead. Discover what skills you might need for 2011, how to grow and become more efficient.

Click here for more:

Please accept our invitation to join us in the City of the Big Shoulders by registering for the 33rd Annual National BDPA Conference, August 3-6, 2011 at the Hilton Chicago.

Early bird registration for $350 now open!

Click here to register for the 2011 National BDPA Conference today!



Hilton Chicago
720 S. Michigan Ave.
Chicago, IL 60603

Subscribe to the BDPA Foundation Blog via email: http://www.feedburner.com/fb/a/emailverifySubmit?feedId=649683
 
Subscribe to the BDPA Community Blog: http://bdpa.site-ym.com/members/blog_view.asp?id=637492

Subscribe to Blacks Gone Geek Blog via email:

Follow us on Twitter: http://www.twitter.com/BDPA

Find the buzz on Twitter BDPA: http://search.twitter.com/search?q=BDPA

This message has been brought to you by the BDPA Social Networking Team:  http://www.bdpa.org/?page=BDPA_SNet

 Contact the BDPA Social Networking Team: socialnetworking@bdpa.org

PS: Please share this information with your friends, co-workers, church members, etc so that they can help us pass the word. The key is that we must share what we know with others so we can all grow and prosper.

Motivational Moment

Napoleon Hill's Thought for the Day (graphic)
Remember, you can place under obligation to you anyone you can induce to accept favors from you.

It is a very basic human characteristic that we tend to respond to others in the same way they treat us. They will always remember the kindness you extended, and someday when you need it most, help will appear from a totally unexpected source. The kindness and courtesies you extend to others need not be large and expensive. A kind word, a friendly greeting, or assistance with a favorite project lets others know that you care enough about them to lend a helping hand. When you help another cheerfully and enthusiastically without asking for anything in return, the law of compensation places that person in your debt. You have made a friend who is now interested in your success.

Permanent link to this post: Remember, you can place under obligation to you anyone you can induce to accept favors from you.

Thursday, January 13, 2011

11 smart career tips for 2011

11 smart career tips for 2011

by  Kathryn Ullrich


Today we have some advice from Kathryn Ullrich, a Silicon Valley-based executive search consultant and author.

Andy Warhol said, “Being good in business is the most fascinating kind of art.”
As a passionate executive recruiter, I couldn’t agree more, particularly when it comes to professionals being good in managing their careers. Here, for the New Year, are 11 career tips for 2011:
1.   Look out for #1. Take responsibility for your own career development. Many large organizations have scaled back on training and development-a common outcome of the economic downturn-and small companies can rarely provide significant support. Simply put, your career rests in one set of hands: yours.
2.   Be strategic. Have a long-term career strategy or, at the very least, a sense for where you’re headed. Ask yourself, “What do I really want to do?” or “Where do I see myself in five to ten years?” Seek people in similar roles and ask for their advice.
3.   Work in step with your company’s goals. Connect the dots from your role to your company’s vision and key objectives. How does your work align with the organization’s goals? What can you do to maximize your contributions?
4.   Be customer-centric. Whether your customers are internal or external, know their wants and needs, and be fervent about meeting them. Bring the voice of the customer into your day-to-day work and let it enhance your decisions and deliverables.
5.   Collaborate. Working with and through others is requisite to innovating, creating, and producing business results. Adopt a mindset for teaming and collaborating, and put it into daily practice.
6.   Hone your communication skills. Communication skills can make or break careers. Pick one area that needs your attention-considering skills such as listening, presenting, influencing, persuading, or distilling messages-and commit to improvement. Take a class, practice with a trusted friend or colleague, or join a group such as Toastmasters.

7.   Cross over functionally. Many successful executives have risen through the ranks by taking cross-functional roles, such as moving from finance to sales or from marketing to IT. Follow their lead and you can grow your skills, your network, and your political capital.
8.   Expand your experience. Volunteer for special projects or assignments that are outside your everyday role. Discuss your goals with your boss, an HR representative, or a senior leader, and ask for help in finding opportunities to broaden your experience base.
9.   Find a guide. Mentors can serve as influential role models and provide important guidance for your career. Reach out to a potential mentor within your company or industry and see if he or she would be open to mentoring you for a specific purpose and timeframe.
10. Network-now. The best time to increase your network is today. Starting now, get involved in groups such as professional associations, charitable organizations, or even sports leagues. Step into leadership roles and make your expertise known.
11. Specialize. Today, companies look for specialists, not generalists. Develop a personal brand, distinguish your skills and strengths, and determine how to best market yourself.

Wednesday, January 12, 2011

Google Science Fair on tap online


Monday, January 10, 2011

Racetrack Memory Aims to Replace Flash/HD

      Racetrack Memory Aims to Replace Flash/HD
       
    • IBM is perfecting a solid-state memory technology that, like flash memory chips, is intended to replace hard disk drives with devices that have no moving parts. And even better than flash, IBM's racetrack memory does not wear out no matter how many times you read, write or erase it.
    • IBM is perfecting a solid-state memory technology that, like flash memory chips, is intended to replace hard disk drives with devices that have no moving parts. And even better than flash, IBM's racetrack memory does not wear out no matter how many times you read, write or erase it.Magnetic memory technologies—notably hard disk drives—can be read, written and erased any number of times, since the only changes made are in the orientation of the magnetic material on its surface, which does not fatigue. Unfortunately, solid-state memories like flash will never completely replace hard disks because they fatigue and wear out after about 10,000 read/write cycles.
      Now, however, IBM has developed a magnetic memory technology that combines the no-moving-parts convenience of a solid-state solution with the speed, reliability and longevity of a hard disk drive.
      Racetrack memories have been the object of intense research efforts by IBM since 2004, when the major processes were patented by the company. Since then, IBM's research team has demonstrated all the component parts needed to read, write and erase magnetic bits serially encoded around a nanowire racetrack, similar in concept to the tiny magnet tracks around a hard disk platter. However, instead of rotating the disk to bring each bit in a track under the read head of the drive, an electrical current is used to push the bits around the nanowire track so that they can be read by a stationary head.



      IBM has demonstrated all the component parts of its racetrack memory, which moves magnetic bits along a stationary nanowire "track" that stores hundreds of times more information than even the densest hard disk.  

      Magnetic information is encoded along the entire length of a nanowire track—each of which can fit in the space that a single flash memory bit occupies today, resulting in memories that are 100 times denser than hard disks and 10 times denser than flash memory. And unlike flash memories, which must use high-voltage currents to force electrons to tunnel through an insulator that fatigues and fails after just a few thousand read/write cycles, there are no atoms being shifted around to cause racetrack memories to fail, resulting in a solid-state memory technology that is denser than hard disks but with more longevity than flash.
      "We move the magnetic information without moving any atoms," said IBM Fellow Stuart Parkin. "An electrical current essentially delivers angular momentum that moves the magnetic domain walls around the track."
      By loading each racetrack with a serial string of magnetic bits, and shifting them around the nanowire, the solid-state memory essentially houses thousands of independent magnetic tracks, each of which can be independently shifted to read/write/or erase any bit on its length—like a hard drive, but without the moving parts.
      Recently, IBM cleared the last hurdle to commercialization of racetrack memories by demonstrating that it can deliver current pulses that can accurately and repeatably move any bit around a racetrack nanowire and position it under the read or write head. Next, IBM will integrate all the components onto a single CMOS chip. 

Friday, January 07, 2011

Motivational Moment

Napoleon Hill's Thought for the Day (graphic)
You never know who your real friends are until adversity overtakes you and you need cooperation.

Everybody loves a winner, it has been said, but nobody knows you when you're down and out. One of the often unappreciated benefits of adversity is that it accelerates the process of identifying your true friends. Most of us have many acquaintances and associates, but we are indeed fortunate if we have a handful of real friends. You will very quickly identify yours when you ask them for help. The wise individual is the one who, when asked for assistance, recognizes that he may one day find himself in the same situation.

Permanent link to this post: You never know who your real friends are until adversity overtakes you and you need cooperation.

Wednesday, January 05, 2011

Motivational Moment


Napoleon Hill's Thought for the Day (graphic)
Before opportunity crowns you with great success, it usually tests your mettle through adversity.

Adversity provides the resistance necessary to develop the strength to overcome great obstacles. This strength consists of self-confidence, perseverance, and, very importantly, self-knowledge. For if you do encounter a setback, it is a clue to a personal weakness. You may have been hasty in judging a competitor, or you may have been too timid in your vision of what needed to be done. Let adversity be your guide to understanding where you mis-stepped and which qualities you need to cultivate. No one rejoices in disappointment, but if you are success-conscious, you can turn the situation into a chance for improving your character, an opportunity you otherwise would have missed.

Read on the website: Before opportunity crowns you with great success, it usually tests your mettle through adversity.

Geinimi Android malware has 'botnet-like' capabilities

Geinimi Android malware has 'botnet-like' capabilities

By George V. Hulme,
 
If you've read any number of 2011 security prediction lists, you've no doubt noticed that mobile malware ranked near the top of each. Not that mobile security predictions took much of a crystal ball or stretch of the imagination to make, but the world didn't even have to wait for the clock to strike midnight on Jan. 1 to see them start to come to fruition.

On Dec. 29, mobile security specialists Lookout Mobile Security identified a new Android Trojan named Geinimi, built to lift and transmit personal data from a user's phone and ship it to a remote server. "The most sophisticated Android malware we've seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user's phone, it has the potential to receive commands from a remote server that allows the owner of that server to control the phone," the company wrote in its blog.
Also see the mobile security survival guide
Looks like mobile malware is starting to grow up. As more of these devices edge their way into the hands of executives and corporate networks, the danger to data is clear. Not only is any proprietary data held on these phones at risk, but so is authentication data such as passwords, usernames and other credentials.
There's no easy solution for organizations, analysts say. "If you think you are going to be able to successfully ban these devices, you are fooling yourself," says Pete Lindstrom, research director at Spire Security. "The only clear short term answer is to increase awareness among employees. You have to reach out to them and make sure they know that data on these devices can be placed at risk," he says.
Geinimi isn't the first Android Trojan to be found in the wild. Last summer Trojan-SMS AndroidOS FakePlayer, identified by Kaspersky Labs, would send text messages to premium services, potentially piling charges on users. That malware was limited to telecommunications networks in Russia.
Also last week, the BBC reported that researchers revealed how easy it is, using a toolkit they developed, to eavesdrop on any mobile call or text message made on a GSM network. Karsten Nohl and Silvain Munaut demonstrated the toolkit at the 27th annual Chaos Computer Club Congress (CCC) in Berlin.
Where the attackers head, investors see opportunity. Lookout Mobile Security announced on Dec. 23r that it raised an additional $19.5 million in third-round funding led by Index Ventures. The round also included Accel Partners and Khosla Ventures.