Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, December 28, 2012
Aldosterone and Renin: The Test
Aldosterone and Renin: The Test: Aldosterone and renin tests are used to evaluate whether appropriate amounts of aldosterone are being produced and to distinguish between the potential causes of excess or deficiency.
Low levels of potassium - definition of Low levels of potassium in the Medical dictionary - by the Free Online Medical Dictionary, Thesaurus and Encyclopedia.
Low levels of potassium - definition of Low levels of potassium in the Medical dictionary - by the Free Online Medical Dictionary, Thesaurus and Encyclopedia.: Hypokalemia is a condition of below normal levels of potassium in the blood serum. Potassium, a necessary electrolyte, facilitates nerve impulse conduction and the contraction of skeletal and smooth muscles, including the heart.
Differences That May Explain Hypertensive Risk: Dietary Potassium Deficiency Independently Associated With Increased Blood Pressure
Differences That May Explain Hypertensive Risk: Dietary Potassium Deficiency Independently Associated With Increased Blood Pressure: "We are currently doing more research to test how low potassium in the diet affects blood pressure through the activity of this gene,"
Friday, December 21, 2012
World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity
World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity: The Elcomsoft tool analyzes memory dumps taken while these encrypted volumes are mounted and isolates the encryption keys. When the process is over, the forensic team (or attacker) can mount the volumes as they would normally do and authenticate with the data provided by the forensics tool.
Sunday, December 16, 2012
Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65
Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65: Hemochromatosis is a common autosomal recessive condition found in the homozygous state in 1/200–1/400 people of northern-, central-, and western-European origin.
Screening for Hemochromatosis: Recommendation Statement
Screening for Hemochromatosis: Recommendation Statement: This statement summarizes the U.S. Preventive Services Task Force (USPSTF) recommendation on screening for hemochromatosis and the supporting scientific evidence.
Thursday, December 13, 2012
Invasion of the cyber hustlers
Invasion of the cyber hustlers: "The cybertheorists, however, are a peculiarly corporatist species of the Leninist class: they agitate for constant revolution but the main beneficiaries will be the giant technology companies before whose virtual image they prostrate themselves"
'via Blog this'
'via Blog this'
A case study in personal genomics from Genomes Unzipped
A case study in personal genomics : Genomes Unzipped: After some thinking, I decided to take my test results to my GP, and see if there was any advice or testing he would recommend. In the end, my GP referred me to a clinical geneticist, which started a cascade of appointments which in turn led to a number of important changes in how I treat my own health.
Saturday, December 1, 2012
Thursday, November 29, 2012
Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012
Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012: " Worldwide smartphone sales will reach 468 million units in 2011, a 57.7 percent increase from 2010, according to Gartner Inc."
'via Blog this'
'via Blog this'
Worldwide Mobile Phone Revenues, Prices & Profits Jump Higher in Q3 2012
Worldwide Mobile Phone Revenues, Prices & Profits Jump Higher in Q3 2012: Samsung and Apple dominate the industry and they are tightening their grip on value share, squeezing out almost all other rivals.
Wednesday, November 28, 2012
Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer
Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer: This is a story about the richest of the rich, as it were, the residents of 740 Park—a building that is home to more billionaires than any other building in New York—and how they have managed to claim a larger and larger share of the nation’s wealth, or as Mr. Gibney puts it in his opening voice-over, how they have enjoyed “unprecedented prosperity from a system they increasingly control.”
Extending Your Content Reach Through Social Media | Business 2 Community
Extending Your Content Reach Through Social Media | Business 2 Community: As savvy organizations work to engage with target audiences through this new medium, one fact has clearly emerged – quality content is vital to social media campaigns that are meaningful, impactful and provide lasting value.
SC's Data Security Company Also Got Hacked - FITSNews
SC's Data Security Company Also Got Hacked - FITSNews: South Carolinians by the tens of thousands are signing up with Experian – one of the nation’s largest credit reporting firms – to protect their data in the wake of an unprecedented security breach at the S.C. Department of Revenue (SCDOR). In fact the state of South Carolina is paying (up to $12 million) to cover the costs associated with this protection – even though Experian is likely to make millions in recurring business off of the deal.
But will such a move do anything to make our state’s data safer?
But will such a move do anything to make our state’s data safer?
Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg
Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg: The cyberthieves broke into an employee’s computer in September 2011 and stole the password for the bank’s online account with Experian Plc, the credit reporting agency with data on more than 740 million consumers.
Tuesday, November 20, 2012
Five Ways to Jump on the Instagram Bandwagon
Five Ways to Jump on the Instagram Bandwagon:
So how can your company engage with the 7.3 million people who use Instagram daily? Here are five suggestions to get the Instagram ball rolling.
So how can your company engage with the 7.3 million people who use Instagram daily? Here are five suggestions to get the Instagram ball rolling.
2012 conferences: Social media, tech & marketing | Socialmedia.biz
2012 conferences: Social media, tech & marketing | Socialmedia.biz:
"we’ve assembled a calendar of the best social media, technology, marketing and news media conferences for the upcoming year. Here’s our roundup of 2012 conferences and events."
'via Blog this'
"we’ve assembled a calendar of the best social media, technology, marketing and news media conferences for the upcoming year. Here’s our roundup of 2012 conferences and events."
'via Blog this'
Sunday, November 18, 2012
Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing
Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing: Are you looking for a room acoustics treatment that looks as good as it sounds?
Acoustic Panels | Acoustical Panels | Acoustic Wall Panels
Acoustic Panels | Acoustical Panels | Acoustic Wall Panels: Acoustic Panels are not used for soundproofing and they will not stop sound from traveling from one room to the next, however they will make the sound inside the room much less noisy, and the less noisy the room is inside, the less noisy it will be outside.
How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers
How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers: I have a little problem where my neighbor can hear even the slightest amount of bass coming out of my speakers at a low volume.
HowStuffWorks "Blocking Sound Through the Walls"
HowStuffWorks "Blocking Sound Through the Walls": When contractors are building apartments or townhomes to sell, they're generally trying to keep construction costs as low as possible. To do this, they'll often construct walls in the cheapest way possible, with shared walls containing nothing more than some 2x4 studs with a layer of drywall on either side. In some buildings, they may add a layer of fiberglass batt insulation to help with noise and temperature control.
Tuesday, November 13, 2012
Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com
Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com:
Apple, Facebook, Google, Microsoft and Twitter have all objected to portions of a federal effort to strengthen online privacy protections for children.
Apple, Facebook, Google, Microsoft and Twitter have all objected to portions of a federal effort to strengthen online privacy protections for children.
Scammer Alert: Phishing for Photos | NBC 7 San Diego
Scammer Alert: Phishing for Photos | NBC 7 San Diego:
"We don't know what they're trying to do with those images," said Stephen Cobb with ESET Security, "but it's an indication of where future attacks may be coming."
"We don't know what they're trying to do with those images," said Stephen Cobb with ESET Security, "but it's an indication of where future attacks may be coming."
'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk
'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk:
A study by the Internet Watch Foundation (IWF) reveals that 88% of self-made sexual or suggestive images and videos posted by young people, often on social networking sites, are taken from their original online location and uploaded on to other websites.
A study by the Internet Watch Foundation (IWF) reveals that 88% of self-made sexual or suggestive images and videos posted by young people, often on social networking sites, are taken from their original online location and uploaded on to other websites.
Monday, November 12, 2012
Karma Lekshe Tsomo
Karma Lekshe Tsomo:
In addition to her academic work, she is actively involved in interfaith dialogue and in grassroots initiatives for the empowerment of women.
In addition to her academic work, she is actively involved in interfaith dialogue and in grassroots initiatives for the empowerment of women.
Saturday, November 10, 2012
Melatonin vs Jet lag
Melatonin vs Jet lag:
I have had great success in using Melatonin and daylight to minimize jetlag. Here is the recipe I follow, taken from New York Times, April 30 1997.
I have had great success in using Melatonin and daylight to minimize jetlag. Here is the recipe I follow, taken from New York Times, April 30 1997.
Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005
Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005:
The inaugural Sun Valley Ernest Hemingway Festival takes place Sept. 22 to Sept. 24 in Ketchum and Sun Valley.
The inaugural Sun Valley Ernest Hemingway Festival takes place Sept. 22 to Sept. 24 in Ketchum and Sun Valley.
Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro
Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro:
It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.
It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.
Friday, November 9, 2012
Web page security report
Web page security report:
"Maybe you can spot some suspicious details there.
For more comprehensive diagnostics consider the following"
'via Blog this'
"Maybe you can spot some suspicious details there.
For more comprehensive diagnostics consider the following"
'via Blog this'
Thursday, November 8, 2012
Image-Stealing Trojan Exposes Victims to ID Theft, Blackmail
Image-Stealing Trojan Exposes Victims to ID Theft, Blackmail:
The threat of image-focused malware may become a big issue on mobile devices.
The threat of image-focused malware may become a big issue on mobile devices.
Wednesday, November 7, 2012
iTunes - Podcasts - The Malware Report by ESET
iTunes - Podcasts - The Malware Report by ESET: "Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security."
'via Blog this'
'via Blog this'
Max OS X Lion Training: How to use Spotlight Search - YouTube
Max OS X Lion Training: How to use Spotlight Search - YouTube:
In this free lesson from our Mac OS X Lion training App discover how to use your Macs built in Spotlight search feature to locate files, launch apps, define words or perform calculations.
In this free lesson from our Mac OS X Lion training App discover how to use your Macs built in Spotlight search feature to locate files, launch apps, define words or perform calculations.
Sunday, November 4, 2012
Angels in Our Lives
Angels in Our Lives: The prophets knew the angels communicated with people through an area on the head where the pineal gland is located. This is the reason why the people in some religious groups shave their heads or shave a bald spot on the back of their heads.
IPM Workshops and Classes
IPM Workshops and Classes:
In this Exploring Inner Dynamics Workshop you will experience the Real You; a soul with a unique purpose and talents. Understand why you are here on Planet Earth.
In this Exploring Inner Dynamics Workshop you will experience the Real You; a soul with a unique purpose and talents. Understand why you are here on Planet Earth.
Saturday, November 3, 2012
Freelance Comic Artists : San Diego, California | Find Freelancers | Freelanced.com
Freelance Comic Artists : San Diego, California | Find Freelancers | Freelanced.com:
"an Illustrator/Designer who specializes in comic and album illustration."
'via Blog this'
"an Illustrator/Designer who specializes in comic and album illustration."
'via Blog this'
Thursday, November 1, 2012
Election campaign ends with chess match in swing states - CNN.com
Election campaign ends with chess match in swing states - CNN.com:
"we need a president who understands business and I do, and that's why I'll be able to get this economy going.""
'via Blog this'
"we need a president who understands business and I do, and that's why I'll be able to get this economy going.""
'via Blog this'
TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com
TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com: (Old)
Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more than 90 million credit and debit card numbers from TJX and other retailers.
Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more than 90 million credit and debit card numbers from TJX and other retailers.
Tuesday, October 30, 2012
Why the GOP Should Fear a Romney Presidency - Jack M. Balkin - The Atlantic
Why the GOP Should Fear a Romney Presidency - Jack M. Balkin - The Atlantic:
if Obama loses, the president who finally unravels Reaganism could turn out to be Mitt Romney.
if Obama loses, the president who finally unravels Reaganism could turn out to be Mitt Romney.
Sunday, October 28, 2012
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds:
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Wednesday, October 24, 2012
IRS policies help fuel tax refund fraud, officials say - CNN.com
IRS policies help fuel tax refund fraud, officials say - CNN.com:
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
Tuesday, October 23, 2012
Chrome Web Store - PhishAri
Chrome Web Store - PhishAri:
PhishAri is a Twitter application which detects phishing tweets in realtime.
PhishAri is a Twitter application which detects phishing tweets in realtime.
Paterva / Maltego
Paterva / Maltego:
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Monday, October 22, 2012
Presentations by CAIDA
Presentations by CAIDA:
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
3 Tools to Scan the File System With Custom Malware Signatures
3 Tools to Scan the File System With Custom Malware Signatures:
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
yara-project - A malware identification and classification tool - Google Project Hosting
yara-project - A malware identification and classification tool - Google Project Hosting:
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape:
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Subscribe to:
Comments (Atom)