• Rob Robinson, Technology, iPad 2, iPhone/iPad

    Posted on November 19th, 2011

    Written by Rob Robinson

    Tags

    , , ,

    The Real Purpose of Technology

    The Real Purpose of Technology

    I am sitting in the corner of the local Starbucks in Cebu City, Philippines listening to the conversations and watching the customers who sit nearby. There are three Korean teens with their noses pressed close to their iPhone’s, apparently discussing the video game they are playing. A Filipina near the Korean teens gazes at her new iPad, then looks around the room to see who is watching her. All over the sidewalk are hundreds of passersby with their faces close to their cell phones, thumbs moving at breakneck speed. I wonder how many come to this public place to be seen with their devices, verses those who just want to use them for the purposes they were intended?

    The Tech companies must know that the value of many of their devices is not it the capability of the device, but in the imparted social value they have by a consumer walking around the mall with one. A few years ago here in the Philippines, a single iPhone or iPad could not be found in the hands of any consumer. Since I moved here permanently a year ago, it seems that every teen and young adult has an Apple product in their hands.

  • Internet, Iran, Technology

    Posted on January 31st, 2011

    Written by B.P.U Contributor

    Tags

    , , ,

    Stealth Computer Virus Disables Iran’s Reactor’s

    Stealth Computer Virus Disables Iran’s Reactor’s

    In the 20th century, this would have been a job for James Bond.

    The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.

    But in the 21st century, Bond doesn’t get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran’s nuclear program but has caused a major rethinking of computer security around the globe.

    Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they’ve all found, says Sean McGurk, the Homeland Security Department’s acting director of national cyber security and communications integration, is a “game changer.”

    The construction of the worm was so advanced, it was “like the arrival of an F-35 into aWorld War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus.

    Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program.

    The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility.

  • Breaking News, Egypt, Internet

    Posted on January 29th, 2011

    Written by B.P.U Contributor

    Tags

    , ,

    Egypt Shuts Down the Internet

    Egypt Shuts Down the Internet

    IDG News Service - “When countries block, we evolve,” an activist with the group We Rebuild wrote in a Twitter message on Friday.

    That’s just what many Egyptians have been doing this week, as groups like We Rebuild scramble to keep the country connected to the outside world, turning to landline telephones, fax machines and even ham radio to keep information flowing in and out of the country.

    Although one Internet service provider — Noor Group — remains in operation, Egypt’s government abruptly ordered the rest of the country’s ISPs to shut down their services just after midnight local time Thursday. Mobile networks have also been turned off in some areas.

    The blackout appears designed to disrupt organization of the country’s growing protest movement, which is calling for the ouster of Egyptian President Hosni Mubarak.

    “[B]asically, there are three ways of getting information out right now — get access to the Noor ISP (which has about 8% of the market), use a land line to call someone, or use dial-up,” Jillian York, a researcher with the Berkman Center for Internet & Society, said via e-mail.

    Egyptians with dial-up modems get no Internet connection when they call into their local ISP, but calling an international number to reach a modem in another country gives them a connection to the outside world.

  • America In Prophecy, Breaking News, Rob Robinson, Russia, Technology, Weapons

    Posted on January 17th, 2011

    Written by Rob Robinson

    Tags

    , ,

    Russia’s New Missile Immune to U.S. Defense Systems

    Russia’s New Missile Immune to U.S. Defense Systems

    Russia’s new SS-18, code named “Satan” by NATO, is capable of delivering 10 Nuclear warheads with a range of almost 10,000 miles.

    Just one SS-18 Missile is up to 500 times more powerful than any of the atomic bombs dropped on Hiroshima and Nagasaki during world war 2.

    Even more terrifying is the fact that all of the current U.S Missile Shields are not capable of stopping the technology that delivers this powerful weapon.

    “This applies in the fullest sense to the USA’s anti-missile defence system and to Nato’s (planned) European missile defence system,” said Artur Usenkov.

    Experts estimate that Russia currently has between 60 and 90 missile silo launchers hidden across the countryside of Russia. Only a direct hit from a thermonuclear weapon is capable of destroying one of these missile silo’s.

    Russia and the United States have been negotiating a new Strategic Arms Reduction Treaty. Both countries were stating that they wanted to cut their spending for nuclear missile systems. No doubt this latest missile technology will required the U.S to answer with a greater system to stop such missile attacks, as well as a new long range Intercontinental Ballistic Missile systems.

  • The New Computer ‘Mark of the Beast’

    The New Computer ‘Mark of the Beast’

    Coming soon to your computer: “The Mark of the Beast?”

    President Obama is making plans to create and Internet identity for American. Howard Schmidt, the White House coordinator for Cybersecurity said “It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet”

    This new department of the Obama administration will be first to address the issue of Internet identity, even before the National Security Agency and the Department of Homeland security.

    Obama’s new “National Strategy for Trusted Identities in Cyberspace” will be drafted and released by this summer. Schmidt said: “We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”

    It is possible that a Smart Card or some type of Digital Signature Certificate will be issued to willing participants that will identify a person during financial transactions or other Internet business.

    The Government promises that no centralized database will be kept of the information voluntarily given by those who sign up for the new digital signature. As if the government has ever kept any of your personal information private.

    Whatever the new Digital Signature becomes, it is for certain that this type of technology will be a part of the new world order brought by the one referred to in the Bible as “The Beast”.

  • Is The Bible the Word of God?, Jesus Church, Technology

    Posted on December 26th, 2010

    Written by B.P.U Contributor

    Tags

    ,

    Many Current Phrases Came From the Bible

    Many Current Phrases Came From the Bible

    If you’ve ever “fought the good fight” or chuckled at “what comes out of the mouths of babes,” you just might agree with him.

    Phrases with roots in the King James Bible are everywhere. Crystal tells NPR’s Neal Conan that writing Begat began with his curiosity about a simple question: How many English language idioms come from the King James Bible? When Crystal posed this question to people, they guessed a wide range of answers — anywhere from 50 to 1,000. So he decided he’d better read the Bible and figure it out.

    “I went through it and looked for every instance of an expression that I thought was current in modern English,” Crystal says. “And then I thought: I’d better read it again, just to make sure I haven’t missed any.” And after that second reading, he had a figure.

    “I found 257,” Crystal reports. He acknowledges that there’s “no magic in that figure” and that someone else could read through the Bible and come up with a different number entirely. Still, he thinks that 257 is about right. And “it makes the point that it isn’t as high a figure as some people expect. On the other hand, it’s twice the number that Shakespeare introduced, so it’s not doing badly.”

  • Discoveries, Signs on the Earth, Technology

    Posted on December 13th, 2010

    Written by B.P.U Contributor

    Tags

    ,

    Smallest Battery 1/7,000th Thickness of a Human Hair

    Smallest Battery 1/7,000th Thickness of a Human Hair

    To better study the anode’s characteristics, the tiny rechargeable, lithium-based battery was formed inside a transmission electron microscope (TEM) at the Center for Integrated Nanotechnologies (CINT), a Department of Energy research facility jointly operated by Sandia and Los Alamos national laboratories.

    Says Huang of the work, reported in the Dec. 10 issue of the journalScience, “This experiment enables us to study the charging and discharging of a battery in real time and at atomic scale resolution, thus enlarging our understanding of the fundamental mechanisms by which batteries work.”

    Because nanowire-based materials in lithium ion batteries offer the potential for significant improvements in power and energy density over bulk electrodes, more stringent investigations of their operating properties should improve new generations of plug-in hybrid electric vehicles, laptops and cell phones.

    “What motivated our work,” says Huang, “is that lithium ion batteries [LIB] have very important applications, but the low energy and power densities of current LIBs cannot meet the demand. To improve performance, we wanted to understand LIBs from the bottom up, and we thought in-situ TEM could bring new insights to the problem.”

  • Technology, iPhone/iPad

    Posted on December 10th, 2010

    Written by Rob Robinson

    Tags

    ,

    New iPad 2 Details Emerge

    New iPad 2 Details Emerge

    Suppliers of the parts for the new iPad 2 have revealed that they are preparing the components for the next generation tablet wonder.

    Five different companies in Hong Kong, chip designer Wintek, battery maker Simplo and cover manufacturer AVY Precision — confirmed they were preparing for the next round of iPads. Two camera companies, Genius Electronic Optical Co Ltd and Largan Precision, confirmed they had started a new supply deal with the Cupertino, Calif.-based, company.

    At least two of the companies mentioned, said that they were already producing parts for the next generation iPad. Components for front and rear camera’s, increased screen resolution, and an external SD card slot for owner upgradable memory storage will be on he new device.

    The case for the new iPad will be approximately the same dimensions in length and width as the first generation model, but just slightly thinner. The introductory price will be about the same as the first generation at $499.99 for the 16 GB WiFi, up to about $799.00 for the 64 GB WiFi 3G model.

    Speculation that a 128 and 264GB solid state drive will be also available as an upgrade for the next generation iPad at a modest price as solid state storage has drastically decreased as production has increased. With the promise of millions of consumers upgrading to the higher storage capacities that will be available, the price for a much larger memory drive should only be slightly higher.

  • The Human Spirit and Digital Information

    The Human Spirit and Digital Information

    Before a recent trip to Asia, I digitized several of my favorite DVD movies and placed them on my portable external hard drive for viewing at a later date. In the prior state as a DVD these movies took up a large amount of space that made them impossible to carry in my baggage. After the movies were changed into coded digital information and were placed on the external hard drive I could easily transport them in my baggage with no added weight whatsoever.

    This is possible because digital information has zero weight. How is it that thousands and thousands of pages of digital code placed on a data storage device can have no mass?

    When we speak of either a massive galaxy or a minute particle of dust, we do so in the same terms because they both have mass, charge, length and width. Yet when we speak of information and matter, these terms are no longer relevant because they have no mass or measure of weight.

    The weight of the 500 GB hard drive that I placed hundreds of movies on, weighed exactly the same before and after these digitized movies were added.

    In the human DNA genome, although it contains thousands and thousands of pages of digital information that directs the cells in their production of protein molecules, they add absolutely no weight to the DNA stand whatsoever. This leaves us with the perplexing question of exactly what is digital information and what is it comparable to?

  • Internet, Persecution, Technology, iPhone/iPad

    Posted on December 2nd, 2010

    Written by B.P.U Contributor

    Tags

    ,

    Design a Christian App on iTunes, Be Removed by Apple

    Design a Christian App on iTunes, Be Removed by Apple

    A Christian organization that recently had its Apple iPhone app removed from Apple’s App Store has sent a letter to protest the removal, asking CEO Steve Jobs to reconsider the decision.

    Late last week, Apple quietly removed the Manhattan Declaration app, which had been available since mid-October, after an online petition was circulated calling the app a “hate fest” and saying that the Manhattan Declaration pushes “hateful and divisive language.” The petition, which originated on Change.org, wished to tell Apple “that supporting homophobia and efforts to restrict choice is bad business.”

    Released in Nov. 2009, the wordy Manhattan Declaration “speaks in defense of the sanctity of life, traditional marriage, and religious liberty. It issues a clarion call to Christians to adhere firmly to their convictions in these three areas,” according to the declaration website. Manhattan Declaration spokeswoman Michelle Farmer told The Daily Caller that the statement and organization have never espoused any hateful rhetoric toward homosexuals or pro-choice advocates but that it does stand behind its belief and hopes that Jobs will listen to their concerns.

    “We’re making the argument that if [Jobs] would take a look at the Manhattan Declaration himself, he’d see it’s not written with any rancor. It’s written on a very even keel,” said Farmer. “It’s just appealing to things that people want to come together on, that millions of Americans agree on.”

  • America In Prophecy, Internet, Science, Signs

    Posted on November 19th, 2010

    Written by Rob Robinson

    Tags

    , ,

    Is China the Newest ‘Internet Terrorist’ Threat?

    Is China the Newest ‘Internet Terrorist’ Threat?

    On April 8, 2010, China re-routed email exchanges from the United States Department of Defense, U.S. Senate, NASA and the Department of Commerce.

    Claiming that the re-routing was “accidental”, there is little doubt that it was malicious intent that was the true motive says the Security Review Commission.

    Larry Wortzel, a member of the commission, said: “We don’t know what was done with the data when they got it. When I see things like this happen, I ask, who might be interested with all the communications traffic from the entire Department of Defense and federal government? It’s probably not a graduate student at Shanghai University.

    “What could you do if you had the stream of email traffic for 18 minutes to and from the US Joint Chiefs of Staff? Most importantly you would get the internet addresses of everybody that communicated.”

  • Discoveries, Science, Technology

    Posted on November 4th, 2010

    Written by B.P.U Contributor

    Tags

    ,

    Scientists Create Moving 3D Holograms

    Scientists Create Moving 3D Holograms

    More than 30 years after the famous Star Wars movie scene in which a hologram of Princess Leia appealed for help from Obi-Wan Kenobi, US researchers have unveiled holographic technology to transmit and view moving three-dimensional images. The scientists at the University of Arizona say their prototype “holographic three-dimensional telepresence” is the world’s first practical 3D transmission system that works without requiring viewers to wear special glasses or other devices. The research is published in the journal Nature.

    Potential applications range from telemedicine and teleconferencing to mass entertainment. “Holographic telepresence means we can record a three-dimensional image in one location and show it in another location, in real-time, anywhere in the world,” said Nasser Peyghambarian, project leader. Existing 3D projection systems produce either static holograms with excellent depth and resolution but no movement — or stereoscopic films, such as Avatar, which give the perspective from one viewpoint only and do not allow the viewer to walk around the image. The new technology combines motion with an impression of genuine solidity.