Tuesday, August 9, 2011

Recent solar flare may disrupt your GPS


Editor's note: Amy Gahran writes about mobile tech for CNN.com. She is a San Francisco Bay Area writer and media consultant whose blog, Contentious.com, explores how people communicate in the online age.

(CNN) -- We're nearing the peak of the 11-year solar cycle, so double-check your GPS and watch where you're going.

On Thursday, the sun unleashed a massive solar flare (see video of the flare and how its effects have been moving toward Earth). Solar flares can disrupt radio communications, including devices that use Global Positioning System technology, such as cell phones, airplanes and car navigation systems.

So if you're relying on your GPS for driving directions, to find your location on your phone's mapping tool or for any other purpose, have a backup navigation system handy, such as a printed map.

Even more important, pay close attention to where you are and where you're going. Don't rely solely on your GPS to give you directions.

In 2006, research from Cornell University proved that solar flares can cause GPS devices to lose signal. This can cause these devices to temporarily misrepresent your location or otherwise malfunction.

"If you're driving to the beach using your car's navigation system, you'll be OK. If you're on a commercial airplane in zero visibility weather, maybe not," said Paul Kintner Jr., head of Cornell's GPS Laboratory. In fact, the Cornell researchers warned in 2006 that 2011 would probably see lots of GPS disruption.

In addition, solar flares can disrupt power systems.

This week, National Geographic reported: "Under the right conditions, solar storms can create extra electrical currents in Earth's magnetosphere -- the region around the planet controlled by our magnetic field. The electrical power grid is particularly vulnerable to these extra currents, which can infiltrate high-voltage transmission lines, causing transformers to overheat and possibly burn out."

Across the nation, electric utilities and grid operators are preparing to respond to such problems.

John Bogdan, director of the National Oceanographic and Atmospheric Administration's Space Weather Prediction Center, told The Associated Press that a number of such blasts is expected over the next three to five years -- and the biggest flares are yet to come. On a scale of one to five, he likened this week's flare to "probably a two or three."

This week's flare (called a "coronal mass ejection") registered M9.3 on the "Richter scale of flares," about the highest level in the "medium" category. Larger flares that fall into the "X" category can cause global radio blackouts, but large M-class flares also can cause radio disruptions.

This is one of a series of recent bouts of severe space weather, as the solar cycle approaches solar maximum in 2013. Other major flares came in February and June, and more may follow. A good place to follow solar activity is SpaceWeather.com.

In the meantime, keep those maps handy.

The opinions expressed in this post are solely those of Amy Gahran.
READ MORE - Recent solar flare may disrupt your GPS

Survey finds smartphone apps store too much personal data



An uncomfortably large percentage of mobile applications are storing sensitive user account information unencrypted on owners' smartphones, according to a new survey of 100 consumer smartphone apps.

Some 76% of the apps tested stored cleartext usernames on the devices, and 10% of the tested applications, including popular apps LinkedIn and Netflix, were found storing passwords on the phone in cleartext.

Conducted by digital security firm ViaForensics, the testing occurred over a period of over eight months and spanned multiple categories, ranging from social networking applications to mobile banking software. The firm tested apps only for iOS and Android, the market's leading mobile platforms.

User names ranked highest on the list of discoverable data. App data -- the term ViaForensics uses for private information exchanged using the applications -- came in second place, with such data recovered from 69% of tested apps.

Mint.com's iPhone and Android apps, which are used for maintaining financial account information, were found to store user transaction history and balance information on the phone.

The Android version of the Mint app stores the user's PIN on the phone unencrypted, ViaForensics found.

"We're already working on ways to make this experience better," said Jason Yiin, lead mobile engineer at Mint.com, in an interview. "At the moment, if users are highly concerned, they can log in and out of the application each time they access it on their phones."

Yiin also points out that if an intruder accesses your PIN, they won't be able to manipulate any account information or move assets between accounts. The intruder will, however, be able to see account balance and transaction history information.

In June, based on ViaForensics' early findings, Netflix promised a security update at a yet to be specified date. But LinkedIn says it is satisfied with the security of its app.

Apple's iOS-based apps scored consistently higher marks than Android apps in ViaForensics' tests. That doesn't surprise security analysts, who say Apple's Keychain security architecture for storing user credentials is stronger than Android's Account Manager.

"Right now, Apple does a better job on iOS in providing an API where app developers can use a pretty decent mechanism to protect stored information," says David Campbell, mobile security consultant at Electric Alchemy. "Currently, that doesn't exist on Android."

Google makes no bones about its platform's security.

"We dispute the claim that this data is insecurely stored on Android devices," a Google spokesman told Wired.com. "The data is not accessible by default unless the phone has been rooted to gain full privileges, which Android actively protects against and would result in similar exposure for any platform."

Earlier this year, German security researchers Jens Heider and Matthias Boll published a paper detailing how to partially circumvent keychain protections in a six-minute procedure on an IOS device.

In any case, developers too often choose not to use the operating system's security resources to begin with.

"What we have is a strong developer community who are good at coding on the whole, but not necessarily experts in security," independent security analyst Ashkan Soltani told Wired.com. "A developer writes an app, and he's just trying to get it off the ground as fast as he can."

With two lucrative emerging mobile platforms, early traction is crucial for app developers competing for space. Apple's App Store menu is closing in on a half-million applications available for download; add the Android Market to that, and you've got another 250,000 titles. App developer teams aren't always focused on security first, especially when some of them consist of a handful of engineers.

"The main thing lacking in mobile development is approaching the platform with the understanding that these are essentially small computers," Eull said. "Computers that are easily lost, and can travel through countless hands afterwards."

Even if you haven't lost your phone, downloading apps can be a crap shoot. The Android Market allows anyone to submit apps for download, with no vetting process to separate the wheat from the virus-infested chaff. That makes for lots of opportunities for malware to sneak in, a common enough occurrence for Google's patrons over the past year.

Three out of ten Android users will encounter a web-based threat on their device this year, according to recent findings from Lookout Mobile Security.

Of course, there are the issues that come with owning a smartphone at all, apps or no apps. In April, two researchers discovered an unencrypted file stored inside Apple's iOS software which stored a list of iPhone 4 owners' locations for a period of over ten months. Dubbed "Locationgate," the discovery turned into a full-blown privacy fiasco for the company.

The file -- "consolidated.db" -- compiled geolocation data from when users' smartphones came into contact with a new Wi-Fi network, or when a user accessed an app on the device that utilized GPS services. It was later revealed that Google's Android platform collected similar geographic data, though in a much more limited capacity than Apple.

Fortunately, some app makers are listening.

After ViaForensics contacted a number of the offending app's parent companies, several issued updates remedying the security concerns. Financial institutions like Bank of America, USAA and Wells Fargo -- all of which arguably have access to a user's most sensitive data -- issued quick fixes to their applications, now scoring a "pass" rating on ViaForensics' tests.

Ultimately, it's safer to take preventative measures than rely on app developers to change their ways.

Apple's MobileMe program includes a remote-wipe option, which lets you erase everything on your phone if it's lost or stolen (Mint.com's app also includes a remote-wipe option). And at the simplest of levels, installing a six-digit PIN on your device is a no-brainer.

"It's a hassle to punch in a PIN every time you want to use your phone," says Eull, "but its even more of a hassle for someone who wants to crack your device."

Though as Ivan Sze noted in an Android forum post, a lock screen PIN isn't the end-all be-all for a dedicated data thief: "Lock screen password entries aren't designed to be formidable security barriers -- it's just to make it inconvenient for regular people."

"It is entirely possible to develop secure mobile apps," said Andrew Hoog, chief investigative officer at ViaForensics. "But it takes the time, energy and resources to do it."
READ MORE - Survey finds smartphone apps store too much personal data

Super Aircraft Demonstration


Historically, vertical flight has required a compromise between hover performance and forward speed. If you look at efficiency vs. speed image on the right; the desired helicopter attributes (good hover efficiency, low speed controllability, low downwash, hover endurance) fall to the left of the plot. High disk loading aircraft such as Harriers and JSF, fall on the right of the plot: while fast, their hovering capabilities are limited, and their operational costs tend to increase due to the required power loading. Sikorsky is focused on creating an aircraft that operates to the right on this scale: providing more speed without compromising the essential attributes that make helicopters valuable.

The Sikorsky X2 TECHNOLOGY™ demonstrator aircraft will incorporate several new technologies and demonstrate them in a flight environment। These technologies include an integrated Fly-by-Wire system that allows the engine/rotor/propulsor system to operate efficiently, with full control of rotor rpm throughout the flight envelope, high lift-to-drag rigid blades, low drag hub fairings, and Active Vibration Control. In addition, the aircraft will be used as a 'flying wind tunnel' to determine the main rotor to propulsor aerodynamic interaction, shaft angle optimization for performance, and blade tip clearance for a range of maneuvers. This will allow optimization of the X2 TECHNOLOGY™ suite for future products.Sikorsky is well on its way in completing the design of the X2 TECHNOLOGY™ Demonstrator with important milestones right on the horizon. We are excited about what it means for Sikorsky, and most importantly, what it means for our customers - more options.

READ MORE - Super Aircraft Demonstration

Tuesday, July 26, 2011

Canon EOS DSLR, advanced technology dual DIGIC 4


In the digital era, the need for photo hobbyists, professionals and journalists will graph soaring high quality camera. Canon, digital camera technology leader in the world, including in the DSLR camera market, strive to develop new technologies and create a customized demands of its users.

Now, the present generation of the best cameras in each segment of the market began to market a beginner to top professional. This innovative steps that underlie the launch of the Canon EOS 7D digital SLR camera in the second half of 2009, said Merry Harun, Director of the Division of Canon, PT. Data scrip in Jakarta, Wednesday (21.10.09).

Canon EOS 7D, continued Merry, presented exclusively for the world of photography that requires high performance and functionality of a DSLR camera. 18 Megapixel CMOS sensor resolution makes the images this camera, has a high sharpness of detail and also provide flexibility for its users to do the cropping in certain parts and printing in large sizes.

The high resolution analog to digital conversion technology as deep as 14 bit does not make this camera to be slow. Armed with Dual DIGIC 4 Processor, the speed of this camera will actually make anyone fall in love with him.

"Imagine the speed of Mi> 8fps continuous shooting with full resolution. 19-point AF system on this camera uses cross-type AF sensors at all points so that the speed of the system focus is totally unbeatable," continued merry convincing.

Admittedly, the room with low lighting conditions is also not a problem anymore with the ISO settings that can be raised to 12,800. Shots of pictures can be seen clearly through the LCD screen Clear View II type measuring 3 inches, even under bright light though.

Integrated Transmitter Speed ​​lite also has invested in this camera for creative freedom with external flash for its users. Not only the high quality photos, users who want to record video

quality Full HD (1920x1080) can also be directly done with this camera, he added.

Another advantage that is not less important, said Merry, security camera shutter up to 150 thousand times and the view finder that has coverage of 100%. Besides all the above advantages, there are many more advantages waiting to be tested by other users. It was a camera into almost any photographer's dream.

? Therefore, many advantages are present in the Canon EOS 7D, we believe anyone who tries will fall in love. This camera offers a blend of high performance and functionality at the same time would greatly facilitate the users in a photo shoot in nearly all conditions? Said Merry.

PT. Canon EOS 7D Data scrip market in Indonesia in the box: Body only worth USD 17.5 million following the lens EF-S 18-135mm IS worth USD 21 million, following EF-S 15-85mm IS worth USD 25 million Kbc10.

READ MORE - Canon EOS DSLR, advanced technology dual DIGIC 4

Nokia Morph Concept-HP High Tech



Nokia did not want to be left to make the sophisticated innovations. Nokia has designed a nano-tech mobile phone.

The development of Nano technology (Nanotechnology)
was remarkable. This technology is touching all areas of life that aims to facilitate the role of life with the advanced media technology. Consider just how the development of HP (Mobile) which has been widely used in our society. Not escape from it's role as one of the NOKIA brand communications technology unceasingly to innovate through the his mobile device.Consider the following how the concept of stacking tool nan advanced research results from the Nokia Research Center and Researchers.

Morph the name given to the future of mobile devices. The discovery of the future of mobile phones is the result of the development of Nokia and the University Cambridge. Ponsel can be bent, the drag on the rolls are flexible. So users to transform their mobile device into radically different shapes.


Mobile devices demonstrate the function of the final destination so that nano technology is able to present a variety of things. These devices can be used as a wristwatch, this device can also be used as a Telephone Clasp and the device bias is used as a Media Player.

Nano-tech phones is not only in the fold, rolled or drawn, but this phone is also transparent. Te
chnologi is designed with a green leaf which strongly suggests sophistication.

READ MORE - Nokia Morph Concept-HP High Tech