Thursday, August 14, 2014

Magnetize the oil to fight against oil spills

Magnetize the oil to fight against oil spills

An American physicist famous Fermilab has filed a patent for an ingenious technique to fight against oil spills. Instead of using surfactants to be safe to the environment in the long term is questionable, it is sufficient to sprinkle oil slicks microparticles of iron. The hydrocarbons may then be recovered using a magnetic field.

On 08/07/2014 at 15:37 - By Laurent Sacco, Futura-Sciences

The Lockheed C-130 Hercules from the army of the United States dropped dispersants on the oil released during the disaster of the Deepwater Horizon, in 2011 the method is not very environmentally friendly even if it is a lesser evil comparison of an oil spill.  © Adrian Cadiz, Wikimedia Commons, DP

http://androidstars.newsvine.com/_news/2014/08/05/25184677-two-separate-species-by-the-wallace-line
http://androidgeek.ucoz.com/blog/right_to_be_forgotten_google_in_trouble_with_the_flood_of_requests/2014-08-06-13
http://carmiell.blogspot.com/2014/08/video-two-tourists-on-back-of-whale.html

Usually Arden Warner handles accelerator physics, that is to say, the problems encountered when packets of particles are accelerated to form stable beams intended to collide. He is a member of Fermilab and his work has had an impact on the hunt for supersymmetric particles and the famous Higgs Brout-Englert-Higgs with the Tevatron . Four years ago, while his wife asked him if there was not an effective way to fight against the oil spill caused by the Deepwater Horizon explosion , the researcher had a bright idea. Why not use magnetic fields to collect the water from oil  ?

Of course, the oil itself is not magnetic, but the physicist wondered if it was not possible to turn it into a kind of ferrofluid . Recall that it is a colloidal solution of nanoparticles ferromagnetic or ferrimagnetic a size of the order of 10 nanometers in a solvent or water. It is the chemist Stephen Papell who performed the first modern synthesis of a ferrofluid by mixing powdered magnetite in the kerosene , so the gasoline from oil , in the presence of acid oleic. There are spectacular vector showing the action of a magnetic field on a ferrofluid which behaves as a kind of magnetic liquid magnetized.

the history of the Internet connections

What will this treasure? It will be sold, says Hold Security, and used to send spam targeted the personal computers being the main target, according to the company. However, Alex Holden says the New York Times that CyberVor seems for the moment to settle "to send spam on social networks on behalf of other groups ".

http://androidstars.newsvine.com/_news/2014/08/05/25184661-a-new-species-of-humpback-dolphins-in-australia
http://androidgeek.ucoz.com/blog/google_accompanies_many_of_us_in_everyday_life/2014-08-06-14
http://carmiell.blogspot.com/2014/08/indeed-ebola-outbreak-favored-by-severe.html

Hold Security actually maybe a little too much and does not hide its commercial approach. In its statement, violently titled " You've been hacked " , the company ends its explanation by the proposal of a subscription to $ 120 per year (90 euros) to check if an account has been visited by Russian hackers. Anyway, despite the number of stolen passwords, the operation seems less serious than hacking 2.9 million accounts at Adobe, which had enabled the thieves also capture card numbers credit.

The information gathered could be used to trace the history of the Internet connections of a user whose IDs and passwords were known, including purchases on the Web. © Jean-Luc Goudet / Futura-Sciences

The risk of this piracy is misjudged

Initially, this team would have bought addresses the black market to create botnets , computers-botnets in which software discrete set to work, and is associated with other groups. In this case, it was to systematically test all the sites were connecting users of these computers , in order to identify vulnerabilities known to attack such as SQL injection (these three letters designating a query system to search the data). Where appropriate, these poorly protected sites were looted by the group members, who have had to work hard.

The risk of this piracy is misjudged
http://androidstars.newsvine.com/_news/2014/08/05/25184635-compatible-anatomical-details-with-trisomy-21
http://androidgeek.ucoz.com/blog/video_a_heck_of_a_sea_a_rare_stripe_seen_at_monaco/2014-08-06-15
http://carmiell.blogspot.com/2014/08/ebola-for-who-epidemic-can-be-controlled.html

Two security experts commissioned by the New York Times and independent of the company, have a list of stolen passwords and say it is genuine. However, the extent of the attack is difficult to assess. Hold Security does not give the names of the sites visited and provides little detail on the operation, including the number of identifiers actually obtained by the fault SQL (although the former had previously been recovered), as pointed out site The Verge.

More than one billion passwords stolen by a Russian team

More than one billion passwords stolen by a Russian team

A specialist security company, Security Hold, brought a wind of panic by announcing the discovery of a planetary flight IDs and passwords. The attack is rather original, based on botnets that test the vulnerability of sites and was verified by two independent experts. But the risks are perhaps exaggerated.

On 08/07/2014 at 13:27 - By Jean-Luc Goudet, Futura-Sciences

From Russia, pirates have collected personal data gleaned from more than 400,000 sites. © ecstaticist / Flickr - License Creative Commons (by-nc-sa 2.0)

http://androidstars.newsvine.com/_news/2014/08/05/25184616-man-of-flores-was-down-syndrome-the-controversy-continues
http://androidgeek.ucoz.com/blog/the_devil_avoids_sea_waves/2014-08-06-16
http://carmiell.blogspot.com/2014/08/the-epidemic-of-ebola-threat-throughout.html

You did not know Hold Security, a company based in Milwaukee, Wisconsin, United States? With its resounding discovery, shot to fame. After several months of investigation, the company specializes in IT security - which had already revealed an attack suffered by Adobe - says 1.2 billion passwords, with the names (actually more than 4 billion but most used several time) associated with more than 500 million email addresses were stolen from 420.00 websites by a small group of hackers installed in Russia. In an article published by the New York Times , the president of Security Hold, Alex Holden, said the hacked sites are very different from those of large corporations to personal sites. He said the group has been operating since 2011, based on a traditional method but with a rare professionalism. The company has named CyberVor because Vor means "thief" in Russian.

Rosetta was a mission without Philae

On the scientific objectives of the lander , we will return in more detail at the time of landing (8-11 November). In case of failure, many of them will be achieved by Rosetta. Only the panorama of the landing site and the use of Consert, which will perform the tomography of the nucleus of the comet, will fail. On this instrument, be aware that it is also installed on Rosetta. Both will work together. "A radio signal passes the component of the instrument in orbit than the surface of the comet is then immediately returned to its source " . Recall that initially, Rosetta was a mission without Philae. It was not until late in the project came to be added.

http://androidstars.newsvine.com/_news/2014/08/05/25184582-the-rosetta-stone
http://androidgeek.ucoz.com/blog/corrector_screen_that_adapts_to_the_individual_39_s_vision/2014-08-06-17
http://carmiell.blogspot.com/2014/08/whales-mitigate-climate-change.html

If it is not possible to determine when the mission of the lander is over, it should die hot! "It's very surprising, but understandable when you consider that a comet is very cold. " In fact, when we will arrive at perihelion in August 2015, "as everything has been optimized for maximum photon , Philae will heat so strong that it will fail " . Of course, "keep him alive until that date would be a great victory".

Placed on the comet, Philae will study the structure

During this part of the mission, the spacecraft will be fully dedicated to the lander and put in the best possible configuration for the help.

Note that initially, the module will run on non-rechargeable battery. It is very difficult to "determine its life, it can work up to five days after it started". Will be taken over by the solar panels that recharge a battery low power. This will allow the lander run long, with one instrument at a time. From that moment, Rosetta is no longer in support of Philae. He will be working around its own objectives and communicate with the probe, during phases of sight between the two devices. Essentially, it will download data to relay to Earth.

Philae and the location of its 13 scientific instruments. © CNES
http://androidstars.newsvine.com/_news/2014/08/05/25184541-chasing-comets
http://androidgeek.ucoz.com/blog/the_screen_as_corrective_lens/2014-08-06-18
http://carmiell.blogspot.com/2014/08/stem-cells-after-graft-failure-nose.html
Placed on the comet, Philae will study the structure

Of the 13 scientific instruments on board include a drill provided by the Italians. It can dig up to 250 mm below the surface of the comet and will charge two successive samples sent to three instruments. This will make it possible to analyze and highlight all the molecules that escape from the comet. These are rapidly photodissociated by the rays UV of the sun, we do not see, from Earth, the molecules daughter. Philae will also he (finally) to see the nature of the parent molecules. Another eagerly awaited and interesting development: the question of the origin of water on Earth .

Comet Infrared and Visible Analyzer

It is "imperative not to ask Philae in the shade" . Or, again because of its shape, a very large part of its surface is! The light of the Sun is in fact vital for this little robot , powered by solar panels. It is "expected to land roughly at the equator and in the morning for 6 hours of sunshine after landing" . But that's not all. Surface roughness is also important. It should not be that arises on land where the mountains are likely to hide, it "could create communication problems between the two devices " . Indeed, the data are relayed by Rosetta Philae and it is important that both are visual as long as possible even if the module has a mass memory . During its operating cycle, it is "important to empty it regularly, because waiting a passage of the probe, waste energy for nothing" .

http://androidstars.newsvine.com/_news/2014/08/05/25184554-fly-the-mission-stardust
http://androidgeek.ucoz.com/blog/there_would_be_oxygen_in_the_earth_39_s_core/2014-08-06-19
http://carmiell.blogspot.com/2014/08/july-news-that-should-not-be-missed.html

Scientists still have no clear idea of its life. That is why from its landing, "a scientific program will begin with the realization of a complete panorama, 360, the landing site" . One, it will not in stereo as 60 °. Its imager, the CIVA (instrument Comet Infrared and Visible Analyser ) includes seven cameras, the stereo pair. Analysis of the panorama depend subsequent operations.

The small Philae resembles a cube with four faces mounted on three feet. Three sides support the solar panels while the fourth contains the scientific instruments. It is very important that the solar panels are directed towards the Sun. If it does not, "Philae has the ability to turn on itself and correct its base" . However, these maneuvers will be carried out in cases of extreme necessity. Indeed, "no one wants to take the risk of something going wrong during a maneuver" . So that the decision is made ​​to turn, "you would have very strong fears, as a very poor location of the solar panels" . It is the analysis of the panorama that will decide whether or not to change its position. Ground controllers and scientists will have only four hours between image acquisition and the order sent to Philae (via Rosetta).