Most popular sports by country — Wyly Wade

Most of the countries one would expect, cricket India, ice hockey Canada, table tennis China. The odd duck is clearly Guyana which most would consider a typical South American country until one realizes that 43.5% of the population is East Indian in origin. These are descendants as indentured servants. From 1838 to 1917 over 238,000 indentured Indian immigrants were shipped to Guyana with 85% being Hindu and 15% being Muslims.

The NFL is once again the most popular sport in America, a poll of 2,331 adults by Harris Interactive has revealed. For at least the ninth consecutive year of such polling, pro football emerged as the favorite sport among those polled. Thirty-one percent of respondents said that pro football was their favorite sport, with baseball checking in at 17%. That represents a narrowing of the gap between the two sports. Last year, football held an advantage of 19 percentage points when it garnered 35% of respondents’ votes compared to baseball’s 16%.

Enhanced by Zemanta

College scholarships and daycare shows a huge improvement to crime and graduation rates

Map of Florida highlighting Orange County

Map of Florida highlighting Orange County (Photo credit: Wikipedia)

Harris Rosen adopted a Florida neighborhood called Tangelo Park, cut the crime rate in half, and increased the high school graduation rate from 25% to 100% by giving everyone free daycare and all high school graduates scholarships.

Enhanced by Zemanta

Infants need red meat for better health — Wyly Wade

Roast beef cooked under high heat

Red meat needed for infants

In a randomized study in Bogota, Columbia has determined that introducing red meat as a supporting supplement is critical to the development of proper amounts of hemoglobin and hematocrit. This is largely due to the type of iron and zinc that is naturally occurring in red meat. This increase was not detected in vitamin supplements or with vegetables that were substituted.

This is an ongoing study series that are being conducted that look at the differences of nutrients depending on the food source they are attached. There are many examples that cards are not cards and the type of food combinations are as important to what you eat as what you eat.

Enhanced by Zemanta

Broken screens be gone…

Broken iPhone 4 Back Glass

Corning has Willow Glass and G-leaf has Zero Glass but flexible glass is coming to a device near you. Having just tested the limits of Corning’s Gorilla glass to the failure point I am looking forward to the new and improved flexible glass for mobile devices. This has a lot more promise then just mobile devices though. One of the issues with solar cell delivery in developing countries is the amount of the devices that are delivered broken due to the harsh transport conditions.

The article also talks about Nipons new invisible glass. This glass is amazing when applied to outdoor environments on mobile devices. Dramatically improves the ability to read on backlit screens.

Enhanced by Zemanta

Dad 3D prints a $10 prosthetic for his boy

Prosthetic hand mod

Prosthetic hand mod (Photo credit: atomic-kitteh)

If you did not think 3D printing, adaptive manufacturing, was going to change everything a special effects artist and father is proof that it is going to be incredibly disruptive.  A father built a prosthetic hand for his 12-year-old son using a 3-D printer. He was able to build a a $20000 prosthetic hand for around $10 worth of materials.

Paul McCarthy, from Marblehead Massachusetts, made the inexpensive yet functional prosthetic hand for his son Leon, who was born without fingers on one of his hands. The family had been told when Leon was very young that he needed to get used to using his hand without prosthetics and try to acquire a full range of abilities and motion, but a doctor recently said they should start looking at prosthetic options.

Enhanced by Zemanta

I-R-C-H AAS Infrastructure, Research, Crimeware and Hacking as a Service

How a botnet works: 1. A botnet operator sends...

How a botnet works: 1. A botnet operator sends out viruses or worms, infecting ordinary users’ computers, whose payload is a malicious application — the bot. 2. The bot on the infected PC logs into a particular command and control (C&C) server (often an IRC server, but, in some cases a web server). 3. A spammer purchases access to the botnet from the operator. 4. The spammer sends instructions via the IRC server to the infected PCs, causing them to send out spam messages to mail servers. (Photo credit: Wikipedia)

If you have not heard of any of these it is not surprising but they are beginning to effect everyones daily lives. All of these have been purchasable in the past but never at the scale that is being exposed today. The advent of the cloud and the proliferation of the internet around the world has brought about a new level of willing hacker. It also has allowed the launching of DDoS attacks that are larger and as complex as the most complex systems in the world.

I recently did an example of an attack that launched 2000 different servers in the matter of minutes to completely flood a switching network shutting off the ability to get any communication out. This shut down everything that ran across an IP network; this included their pbx switch and their building security. It would have only taken a bit more to have caused their cell phones to not work as well leaving the building an island ready for a physical attack.

Crimeware is widely exploited by the criminal underground that seeks to improve its economy by the easiest means. The gist: “Criminals have started to use online cybercrime services instead of having to deal themselves with the technical challenges of running their own Crimeware server, installing Crimeware toolkits or compromising legitimate websites,” says Finjan.  In other words, it’s point, click and hack (Dignan, 2008).

Cybercrime thieves operate in a market that is sensitive to location and economic trends, they cannot use a “one-­‐scheme-­‐fits-­‐all” approach. The attacks must be customized for each geographic region and focus on a selected group of users and/or businesses. These attacks are often called “campaigns” and incorporate Crimeware toolkits, Trojans and Botnets to do their dirty work (Finjan, 2008).

Enhanced by Zemanta

The ‘smartest’ city = Santander, Spain

El Sardinero beach, in Santander (Cantabria, S...

An old port city on Spain’s Atlantic coast has emerged as a prototype for high-tech smart cities worldwide. Blanketed with sensors, it’s changing the way of life for its residents. Santander is a picturesque coastal city – the sound of waves, crashing on the seawall, provides a gentle backdrop to daily life. Aside from the occasional ferry from England, the town in the northeast of Spain doesn’t get too many foreign visitors. It turned quite a few heads, then, when delegations from Google, Microsoft and the Japanese government all landed here recently, to literally walk the city streets. What they’ve been coming to see though is mostly invisible: 12,000 sensors buried under the asphalt, affixed to street lamps and atop city buses. They silently survey parking availability, and whether surf’s up at local beaches. They can even tell garbage collectors which dumpsters are full, and automatically dim street lights when no one’s around.

Santander’s old port city is being revolutionized with sensors The sensors were paid for by a 9-million-euro ($11.8 million) EU grant, and are supervised by Luis Munoz at the University of Cantabria.

Enhanced by Zemanta