Visit medicalcanastore.com to find out more regarding buy marijuana online | buy weed online | weed for sale | buy hemp oil| buy Cannabis Online | buy thc oil | buy marijuana concentrates | buy Medical Marijuana Online | buy marijuana strains
A number of astronomers from the University of Hertfordshire, led by Mikko Tuomy managed to find a planet that may have Earth-like conditions, which also means there may be life on the planet (exoplanet).
The findings were obtained after Mikko and the members of the research team conducted more than 6,000 times the observations towards the star Tau Ceti. By using the analysis method called the Bayesian Analysis Methods, they came to the conclusion that the star Tau Ceti has 5 planets orbiting around the star at a distance closer than the distance of the Sun to the orbit of Mars.
Selection of Tau Ceti star as the team’s observations focus of the project Ozma started in 1960 that aims to seek the possibility of life beyond Earth. Tau Ceti star when it was chosen because it has the power beam that is similar to the power of the sun rays.
Star Tau Ceti is the nearest star to the Sun diurutan twentieth, a distance of approximately 11.9 light years from the Sun. Tau Ceti star belonging to the class of G, with a mass of 0.78 solar masses, and approximately half the luminosity of the Sun. The estimated age of a billion years older than the Sun. And the condition is very stable, more stable than the Sun.
In the field of information technology, the most important topic – but also one of the most difficult for computers – is the human voice.
Around the 70s, the human voice recognition technology using statistical models of thousands of samples of human voice and in a variety of languages. Combined with the still poorly growing computer hardware capabilities, this technology is still far from perfect.
In 2010, 40 years after that, Microsoft launch the voice recognition research using a new approach. This time, a new branch of science that neural network is used to solve this problem. By using a model of how the human brain works and combined with the capabilities of computer technology has meraksasa (big data), the latest technology is capable of reducing the error s / d 30%.
If the first 4 words for each error will occur 1 time, then with the latest technology to achieve the first time the possibility of error for each of 7 words. Not perfect of course. But significant progress occurred. With relatively low error rate, then the human voice recognition technology which is then combined with the technology capable of translating shocked the public. Because it allows people to speak in their native language which directly translated to another language in real time.
Barriers to language already appears to be solved with this technology. We do not need to learn a foreign language and a variety of business-related foreign language course soon experience a period senjanya.
Do you think spinning articles will be useful to find backlinks or upload articles as much as possible to your blog ? In 2012, Google has changed a lot . Lots of new algorithms well known to the public such as Google panda and penguin or undisclosed by Google .
I had had time to wonder , why the blog is updated every day with unique articles , quality and readable turns his SERP does not go up and visitor not being increased . Indeed, from the article that I created manually Spin content of others, but it’s still high quality and unique ? Spinning articles to be sent to article directories , or your blog itself , it is futile . Here’s why :
– Spin article can reduce the quality of the article
original . So as good -good spinner software will not be able to make a article duplicates with the same quality .
– Using multiple synonim will make the reader confused and tired to read , we are finally down Pageview
– Google may know that the article is the result of a spin because , structural similarity / google can track by synonim ( why not ) and Google certainly has set up a way to eliminate cheating spinning article
– Placement of articles that spin is limited . Do not think that one can spin article placed in 100 different directories , google certainly know about it and think of it as spam
– Most article directories have a spam article was ” aware ” by google panda , so when we link our own page , it is also a great loss
Some of the above is certainly enough reason to explain why Spinning articles is futile . So what’s the solution ?
– Create unique articles and have other ideas than the existing article
– You do not need to buy software effortlessly spinning again
– There are so many quality websites that we want to run an article , so do not worry
– The time taken in this way is a bit long , but with a quality blog article we will experience constant progress from time to time
As has long been known , the laser light is light that is uniform wave pattern consisting of rays that measure more subtle and normally can only be emitted in a straight line , but has since some time the experts knew that the pattern is superimposed on the laser can make laser is turned . The pattern can be designed in a certain way so that the number of lines that make up the light beam a laser beam can influence each other so that the laser shots turn . ” But it can not bend at an angle more than 10 degrees , because if the bend angle is more than 10 degrees then terbut light will be distorted and changed shape ” , according to Mordechai Sergev from the Technion – Israel Institute of Technology in Haifa .
He shared some of his colleagues are constantly trying to investigate further on this by studying Maxwell ‘s Equations which is the basic law of the behavior of electromagnetic waves . In theoretical calculations , they concluded that it is very possible to make the basic patterns in order to deflect the laser light over 180 degrees without distortion . These results have been published in Physical Review Letters by number documentation DOI : 10.1103/PhysRevLett.108.163901 . But this is still a theory .
Meanwhile , without their knowledge , a team of researchers led by John Dudley at the University of Franche – Comte ‘ Besancon France has melkukan test against this practice .
A shot of laser light that is able to turn themselves in at an angle like a boomerang successfully transmitted in an optical laboratory in France . Light with a diameter of only a few micrometers in size that can change the way the material to carve microscopic in size and it is hoped will be able to assist the surgeon makes an incision in the very thin in areas that required surgery but are difficult to reach with a straight laser beam on the patient’s body .
Dudley team of researchers managed to find a way to turn the corner of the laser can exceed the limit angle of 10 degrees . ” It is giving out the idea to us , that we will be able to make a greater angle curve again ” said a colleague of Dudley Francois Courvoisier .
Dudley team of researchers measuring several micrometers light fired at an angle more than 60 degrees by using a tool called the ” Spatial Light Modulator ” to ” superimpose ” the light interference pattern .
This work will be presented in the Journal of Optics Letter to come.
In their experiments , the research team uses a laser that can Dudley dibelokan is to carve and shape indentations in the glass . ” This will be very useful to create a prototype of a new design of optical equipment such as micro lenses for cameras and special projectors before you produce it en masse ” , said John Dudley . The surgeon can also use it to reach areas behind the operation of sensitive structures in the body of their patients .
Segev said that he hopes his team will be able to use these techniques to transmit light in turn full circle and use it to manipulate nanoparticles that can be loaded with drugs which can then be guided to treat specific areas in the body . During the laser light has indeed been successfully used as an ” optical trap ” to control nanoparticles , but by using a laser that can be deflected , then control of the nanoparticles will be developed to a higher degree .
Metamaterials reveals some of the most interesting properties ever seen in the material and will have the potential to change the industry in a fundamental way . Applications can be very wide ranging from science , information and communication technology , and even the arts .
Metamaterials are artificial materials engineered human technology that has a geometric structure built of materials that can be engineered microscopic . The aim is that the new material can redirect light , sound , and ( another wave ) in a meaningful manner .
An expert can use the geometry of the material , the size and composition of the material structure to create different effects from the original . One classic example is the use of copper coil array for invisibility cloak on 2D objects so that when illuminated with certain frequencies of electromagnetic waves , such as Duke University in 2006 , the object will be able to disappear from human sight .
The problem with the Duke University in 2006 is that it only works for 2D objects in a single frequency and microwave .
If we want to create something that is invisible to the eye , we need to make it work:
1 . in the visible spectrum ,
2 . in broadband visible light ,
3 . for 3D objects
And in 2012 , has now been able to create a technologist microwave cloak to form the basis of a 3D object . The experts have also been able to make it work on broadband ( ie not just a single frequency but at different frequencies ) . Currently also being tested first metamaterial that will be operating in the visible light spectrum using 15 to 35 nanometers thick layers of silver and hydrogen silsesquioxane (a type of glass ) .
It takes maybe 5 years before we can achieve broadband characteristics , 3D , visual spectrum of the metamaterial that will be used in the normal objects and the human eye . And then 5 more years to figure out how to scale manufacturing to large -scale objects . One idea is to use bio- technology to produce synthetic bacterium capable of printing nanometer coating to the surface of the material to provide scalable and low permeability .
Wave metamaterial for Other Types
Metamaterials derive their exotic nature by interacting with waves in a special way . Apparently, you can also apply the same concept to other types of waves using metamaterials .
You can make a cloak for : radar ( radio waves only ) , acoustic ( hide you from Sonar ) , seismic waves ( which will help you block / drain earthquake waves that enter the building ) .
Most eventually , the metamaterial allows us to hide the object of the most recognizable form of the possibility of a military attack to defense ( hiding the strategic objects and others ) . Nevertheless metamaterial invisibility is not just about the visual – make your building “invisible ” , but also for the seismic wave in order to enter the building design standards in 10 years . Cloaking your wifi / cell network from interference from other networks can improve network bandwidth and reducing latency . Partly also to the cloaking surface of your monitor to reduce eye strain and remove the reflection .
Metamaterial for Super Lens
This is where that would be really interesting , metamaterials can also produce many effects outside the cloaking effect . Depending on , the size of the geometry settings , and the materials used , it is possible to create a super lens that allows us to go beyond the diffraction limit of the normal lens .
Most minimal : make smaller chips through the lens of a high -resolution , super microscope , and mobile phone or camera lenses better . Wireless power transfer is more focused , better satellite imagery , more efficient solar cells , lasers are more focused and are still open to other tools that have lens .
But for the present , super lens technology is still limited to one frequency and not to the visible light spectrum but this proposal has been opened . The next super lens can be applied also to other types of waves , acoustic , seismic and magnetic microphones are very sensitive as well as safe for mobile devices .
Metamaterial for field mechanics
Refractive index metamaterial can reverse light ( illustrations ) , but the latest technology has also revealed that the metamaterial can also be used to reverse the properties of the material outside the optical field ( mechanical characters ) .
For example , when the metamaterial we tap into a piece of elastic foam or bubble , normally , would be flexed into the foam . But the metamaterial , we can make the foam poking outwards towards the direction of the force coming / finger pressure against us ! So the mechanical properties are also inverted . This is a recent discovery made in 2012 . Applications will be very broad include : technology sneakers / shoes are more comfortable , mobile phone casing better that do not break when you drop it , the more efficient wheels for cars and better body armor ( bulletproof armor probably stronger ) .
WIFI antenna the better .
Intellectual Ventures Nathan Myhrvold recently found metamaterials antenna , which will help increase the bandwidth of your Internet connection . Each element of metamaterial antenna can be tuned to direct the radio waves . Likewise , this means a better phone because it saves energy . And on the mobile operator ‘s data transceiving means making more power efficient .
Flips Directions Time
One wild theory is also growing due to the presence of the metamaterial is a process to reverse the direction of time . The point ? As we know , if you drop your phone and then broke apart , little you can do . But with metamaterial , an object can be installed kind blueprint components ( or some sort of technical DNA ) . This allows your phone to reconstruct the original state . Not to re-assemble the components , but the reverse characteristics of the material at the microscopic level .
In the framework for building Google Chrome OS, there are two new technologies that have not been applied before, namely:
1. Native Client
The problem is, this technique should be very careful to apply because it allows the operating system to execute meaningful programs as well as program execution opportunities unwanted viruses alias et al. Therefore the first choice method of sandboxing technology is that the programs remain separate from the client operating system.
The second technology allows web browsers to access the graphics card on the client computer to a web application to display high-resolution graphics as well as desktop applications. During this time the web application is still limited access to the graphics card via plugins such as Adobe Flash plugin etc.. With O3D technology, it is possible to play 3D games such heavyweights Arena etc. directly from a web browser.
Taking aim at the computing power of the client computer to the web application can run faster and on par with desktop applications. By registering as a patent, Google’s secure technology from other vendors covered claims. And make Chrome OS a status remains Open Source Open Source.
E. coli bacteria has been known since long ago as the cause of death of millions of people in the history of human civilization due to outbreaks of diarrhea and vomiting that they caused . But recently a team of student researchers from the Chinese University in Hong Kong have found other facts of this bacterium , which can be used as a tool to store data information .
The research team managed to find a way to encrypt and store data -kan in E. coli DNA . One gram of bacteria can store up to 4.502 million Gigabyte information in their DNA .
BioStorage , which means the storage of data in living things , is actually not something new , because it has been known since about ten years ago . But the efforts of the experts lately more and expand the possible uses of this BioStorage . For example a team of researchers from Japan about 3 years ago managed – encode it relativity Einstein’s equations into bacterial DNA . It is proved that humans could use bacteria as a data storage medium that is efficient, given the relatively very easy for bacteria bred . In addition , it is known that some bacteria were able to survive in extreme conditions .
Meanwhile , a team of researchers from Hong Kong was able to prove that the type of data that is stored not only in the form of text data , but even images , music , and videos can be stored either in DNA bakteri.Tim these researchers managed to put together equipment that can compress data and then store it in a number of cells and mapping the position of the data in the cells used , so it can be used when needed . Furthermore , they even have developed a three-tier security system for such data to prevent ” hackers ” disrupt the system .
This hongkong student team is working to develop their technique to encode extra information of an organism that can genetically modify a plant and draw up a sort of ” Bio Barcode ” to identify these plants are expected later can be used to track and control the spread of plant – these plants .
If first you must install a special application for the Torrent , in the future , the HTTP protocol will be made more sophisticated with the advent WebRTC feature , where it will open the door for applications peer2peer .
Torrent download speeds with an average could rise significantly because it is not limited by the server , if you download using Torrent , server load will be divided on many server / peer simultaneously . The more seeders ( providers ) the faster you complete the download process . Our experience , to download the latest Ubuntu ISO from Ubuntu server in Indonesia takes 5-10 hours due to server speed limit. Whereas with Torrent , download completion – miraculously – in 15 minutes !
Web standards for WebRTC ( Real Time Communications ) middle was developed and tested by at least three players who have been fairly well known , namely Chrome , Opera , and Firefox . Chrome has issued a trial edition / developer for peer2peer feature video -sound communication that allows us to do a skype – call ‘s type communication simply by using a web browser . While Firefox scheduled end of June this year 2012 for the feature . What is interesting , Opera seems to stop only on the features of Access Video Camera and Sound , but the news has not appeared peer2peer s / d now . Could Opera still hesitant because like repeat Opera United on this new feature ? Let’s wait .
Currently , yes second, which discusses WebRTC draft send send text data and binary between 2 PC / Web Broser directly , is being drafted by a team WebRTC . The finished creation is a web browser the ability to send video and voice streams peer2peer .
If the data is text and binary can be shipped peer2peer implications are very broad :
1 . of sending files peer2peer aka Torrent
2 . free video – voice call between two web browsers plus sending your text chat directly .
3 . ALL KIND OF APPLICATION peer2peer you can think of : including for example : make Web HOSTING by utilizing peer2peer topology . Wow ! Bisakan you look towards the internet ?
Only in the past few generations, the Bamboo Curtain has now been transformed from an agrarian country into a country with the largest industrial and commercial power is very strong . China ‘s economy is now 20 times larger than 20 years ago and are now beginning to approach the economic strength of the United States is the country with the strongest economy today .
But other things that also need attention besides incredible strength economies rapidly is the fact that the Chinese government is actively today are building their military strength .
Ten years ago, the budget allocated for the Chinese People’s Liberation Army ( People’s Liberation Army ) is about 20 billion dollars . And this time , some analysts expect the military budget has almost reached 160 billion dollars .
Chinese President Hu Jintao stated that the People’s Liberation Army of China is the mission of the new historic 21st century . Of the task of maintaining the sovereignty of China into the global magnitude that army can be a true superpower .
In several instances the presence of Chinese troops can indeed go hand in hand with the U.S. military as when China joined the anti-piracy patrols in the Somali sea .
But some analysts worry if one day the two forces met in a condition with beseberangan mutual goals . Then there would be very risky for both countries alike have the best military technology today.
U.S. government officials are not just worrying magnitude of China’s military budget , but also the fact that China’s military now has the capability of military technology which is almost equal to the United States .
For example , during the U.S. argue that the F – 22 and F – 35 aircraft is a fifth – generation fighter which only the United States alone ( both aircraft types is the aircraft that has the ability of anti tracked radar , capable machines and systems the greatest flight control , and has a dedicated network computer systems ) . However , in 2011 , when the U.S. defense secretary Robert Gates to visit China , Chinese President Hu Jin Tao greet with featured performances flight J – 20 fighter plane over the city of Cheng Du ( This is just one type of anti- radar aircraft that are not kept secret , how with the others ? ) .
China is also now actively developing drones ( Unmanned Aerial Vehicle ) . Examples plane I Yilong ( Pterodactyl ) and BZK – 005 which both have the exact specifications of the Predator and Global Hawk belongs to the U.S. military . Before the two aircraft was introduced , China has also noted that the unmanned aircraft by the western dubbed as the Dark Sword . Dark Sword was first detected on the west side in 2006 ago and is expected to be able to travel without the crew away from the territory of China . And to support their fighter force , last summer the Chinese government has announced the construction of 11 new air bases along the coast of China .
In addition , if previously only the United States has the ability to send aircraft carrier full of combat-ready aircraft kesetiap corners of the earth , China is now known to have bought the aircraft carrier -sized belong to the former Soviet Union 65 thousand tons with a Travel Agent utilizing fake as corporate buyers. The aircraft carrier is now known to have been equipped with new weapons including machine and in this regard a number of surface-to- air missiles by the western dubbed Flying Leopard ( Lion Fly ) and automated air defense system . The aircraft carrier named Liao Ning is now capable of carrying 50 fighter jet unit Shen Yang J – 15 ‘Flying Shark ‘ ( Flying Shark ) . This fighter jet capable fighter jet comparable to the U.S. F- 18 .
And the development of technology for the Chinese Army , the Chinese government now also has a number of long-range missiles were coded DF – 21D . The missile can be launched from a special truck , so it can be mobilized quickly . West side called him as Carrier Killer .
In addition , in secret , China is preparing a number of known anti- detection radar destroyers , each measuring 8 thousand tons and the number of nuclear submarines and a number of ships launching amphibious vehicles .
The latest news said that China recently launched a new cruiser is 36 thousand tons named Bahai Sea Green Pearl is capable of transporting 2 thousand soldiers along with 300 combat vehicles . In China it is said that they are now ready to support the mission of the UN security forces even though they should be in the interior of Africa or South America .
Please note that until now , the military and government information systems United States and 80 % rely on GPS satellites .
Meanwhile , China is developing a number of known satellites are able to act as a micro- plane ‘ kamikaze ‘ so that they can shed any satellite that China is seen as a danger to himself by crashing the satellite into the opponent . Besides, the surface of the earth in China is developing a laser gun that can melt any satellites are considered as enemies that pass in the airspace of China .
Senior Colonel Yao Yun Zhu of the Chinese Academy of Military Science states that now the United States is not the only country with the power of a super power in space . China is preparing to ship more than 100 military and civilian satellites in this decade using spacecraft sending unmanned and reusable . The spacecraft was named Shen Long .
In the event of war ‘ Cyber ’ , China has also developed a system called informationized Warfare ( Armaments Information System ) . If the United States has a Cyber Command , China is now number 130,000 personnel trained for war information systems .
Meanwhile , last week , the U.S. Navy has completed the placement test X – 47B aircraft aboard the Nimitz -class nuclear -powered aircraft carrier USS Harry S Truman . X – 47B is an unmanned fighter jet aircraft ( Unmanned Combat Air System / UCAS ) Northrop Grumman made in the United States .
The trial began on November 26, 2012. In this trial includes tests still take off and land on the aircraft carrier . This trial , among others, aims to do the testing procedures for the transport and placement of this particular aircraft on the aircraft carrier , tethering on the deck with the tractor transfer , the operator controls the direction of the position by using a pulley , and testing of digital systems in the engine area filled with electromagnetic waves .
Back to the discussion of military technology China and the United States , the two countries both have nuclear weapons . But both parties will be expected to not use it all because both sides are equally aware that the use of nuclear weapons is tantamount to suicide , given the effects of nuclear weapons is not only radiation but also destroy your opponent can hit yourself and other parties involved .
And until now, no single country in this world has enough readiness to face a nuclear war . Despite all the nuclear weapon states have also built bunkers to withstand , neither bunkers are guaranteed 100 % safe from radioactive radiation . And the bunkers will also not be able to accommodate all citizens owners of nuclear weapons .
Thus , it is a concern that the United States is a non- nuclear weapons – weapons the Chinese side .
It is currently the United States and China are bound in many trade and investment agreements . But as described earlier , there is always the possibility of the two parties may have opposing interests , and this is very risky though both the government stated that the disputes that may occur between the two countries will cause huge adverse effects for both parties so that they will always try to avoid direct confrontation .
Perhaps that’s why when several intelligence reports indicate that the Iranian spy plane RQ – 170 that crashed on the border of Iran recently turned out to be made in cooperation with a number of Chinese scientists , the U.S. government chose not to say much .
Indeed in many ways the United States need to be very careful in dealing with China . Because , in contrast to the former Soviet Union which is a combination of many communist countries are ‘ forced’ to unite in the Soviet Union consisted of many races and tribes so it is relatively easy to be divided . China since ancient times is a single country racially fairly homogeneous .
In addition , in the United States alone since the days of cowboys are a lot of people of Chinese descent are difficult to distinguish which Chinese descent where the Capitalist and Socialist . Unlike the Chinese State , where the presence of the white man is very easy on the mark .